/((to freeie^s Ttawf
DREAMS
3*2.
(W *'
4 l •
% frtls WTT*>-
This U the flip side of Computer Lib .
(Peel free to begin here. The other aide
ie Juet if you went to know more ebout computers,
which ere changeable devices for twiddling sym¬
bol*. Otherwise skip it.)
(But if you change your mind it might
be fun to browse.)
In a sense, the other aide has been a
come-on for this side. But it's sn honest come*
on: I figure the more you know, the readier
you'll be for what I'm saying here. Not neces¬
sarily to agree or be "sold,” but to think about
it in the non-simple terms that are going to be
necessary.
The material here has been chosen largely
for its exhilarating and inspirational character.
No matter what your background or technical
knowledge, you'll be able to understand some of
this, and not be able to understand some of the
rest. That’s partly from the hasty preparation
of this book, and partly from the variety of in¬
terests I'm trying to comprise here. I want to
present various dreams and their resulting dream
machines . all legitimate .
If the computer is a projective system, or
Rorschach Inkblot, bb alleged on the other side,
the real projective systems-- the ones with pro¬
jectors in them-- are all the more so. The things
people try to do with movies, TV and the more
glamorous uses of the computer, whereby it makes
pictures on screens-- are strange inversions
and foldovers of the rest of the mind and heart.
That's the peculiar origami of the self.
Very well. This book-- this side. Dream
Machines -- is meant to let you see the choice
of dreams. Noting that every company and uni¬
versity seems to insist that its system is the
wave of the future, i think it is more important
than ever to have the alternatives spread out
clearly.
But the "experts" arc not going to be much
help; they are part of the problem. On both
sides, the academic and the industrial, they are
being painfully pontifical and bombastic in the
jarring new jargons (sec "Babels in Toyland,"
p. *7 ). Little clarity is spread by this. Few
things are funnier than the pretensions of those
who profess to dignity, sobriety and profession¬
alism of their expert predictions - especially
when they, too are pouring out their own personal
views under the guise of technicality . Most peo¬
ple don’t dream of what’s going to hit the fan.
And the computer and electronics people are like
generals preparing for the last war.
Frankly. 1 think it’s an outrage making it
look as if there's any kind of scientific basiB to
these things; there is an underlevel of technicality,
but like the foundation of a cathedral, it serves
only to support what rises from it. THE TECH¬
NICALITIES MATTER A LOT, BUT THE UNIFYING
VISION MATTERS MORE.
Technology fs an expression of man's dreams. If man did
not Indulge his fantasies, hts thoughts alone would inhibit the
development of technology itself. Ancient visionaries spoke of
distant times and places, where men flew around and about, and
some could see each other at great distance. The technological
realities of today are already obsolete and the future of
technology Is bound only by the limits of our dreams. Modern
cofimunl cat ions media and in particular electronic media are
outgrowths and extensions of those senses which have become
dominant In our social development.
Hon yachapret8 , "Hyper-Reality . "
(£) Auditaa Ltd. II?}.
cqiiwH
JtlL
{W.
\
Ladies and gentlemen. the a(r of
prealidifitAlnre presentation and pub¬
lishing U about to begin. Palpitating
presentation*, screen.scribbled, will
dance to your detire, making manl¬
iest the many mysteries ol winding
wisdom But il we are to rehumanize
an increasingly brutal and disagree¬
able world, we must step up our
efforts And we must hurry. Hurry.
Step right up.
Theodbr" H. Ueleon,
"Bamum-Tronice."
Suarthnore 'ol lego
Alurmi Bulletin,
"When you're Geo 1970, 12-15.
dealing with media you're in ibow builnctt. you
know, whether you like it or not'
“Show botincM," he takl. 'Absolutely. We've gotta
he in tliow bminest. We've gotta pul together a team
that will get ut there"
I made n mental note to air the show burinra me¬
taphor again, and continued. "IBM's real creative tal¬
ii it pi iiii.il ily 1M in other areas.. .*
Ileynood Gould, Corporation
Freak (Toner), 23.
Tim Great Robert Crumb,
t From Zap Com'Cx »(J. )
f[» mort *< *iore t»e4r-
jfC* m»n 1 t*ciesr'J,rfj far.
-we 6cmu, DMJtsruToj,
IS HOT 'W OUR STAfc/
Bor ouitscLv*j.
This book has several simultaneous inten¬
tions: to orient the beginner In fields more
complex and tied together than almost anybody
realizes; nevertheless, to partially debunk
several realms of expertise which 1 think de¬
serve slightly less attention than they get;
and to chart the right way, which I think uniquely
continues the Western traditions of literature,
scholarship and freedom. In this respect the
book Is much more old-fashoned than It may seem
at the gee-whiz, very-now level.
The main Ideas of this book I present not
as my own, but as a curious species of revealed
truth. It has all been obvious to me for some
time, and I believe It should be obvious as well
to anyone who has not been blinded by education.
If you understand the problems of creative think¬
ing and organizing ideas, if you have seen the
had things school so often does to people, if
you understand the sociology of the intellectual
world, and have ever loved a machine, then this
book says nothing you do not know already.
For every dream, meny details and intri¬
cacies have to be whittled and interlocked. Their
Joint ramlflcatlona must be deeply understood by
the person who is trying to creste whstever-lt-is.
Each confabulation of possibilities turns out to
hive the most intricate snd exactly detailed rcsulte.
(This is why I am so irritated by those who think
"electronic media" are all alike,)
And each possible combination you choose
has different precise structures implicit in it.
arrangements and units which flow from these
ramified details. Implicit in Radio lurk the
Time Slot and the Program. But many of these
possibilities remain unnoticed or unseen, for ■
variety of social or economic reasons.
Why does it matter’
It matters because we live in media, ae
fish live in water. (Many people are prisoner*
of the media, many are manipulators, and many
want to use them to communicate artistic visions.)
But todsy, at this moment, we can and must
design the media, design the molecules of our
new water, and I believe the details of this design
matter very deeply. They will be with us for a
very long time, perhaps ss long as man has left;
perhaps if they are aa good as they can be, man
may even buy more lime-- or the open-ended
future most suppose remains. (See "Endgame,"
p. C? .)
So in these pages 1 hope to orient you some¬
what to various of the proposed dreams. This is
meant also to record the effortB of a few Brewster
McClouds, each tinkering toward some new flight
of fancy in his own sensoarium.
But bear in mind that hard-edged fantasy
is the corner of tomorrow. The great American
dream often becomes the great American novelty.
After which it’s a choice of style, size and fin¬
ancing plan.
The most exciting things here are those
that involve computers: notably, because compu¬
ters will embraced in every presentational medium
and thoughtful medium very soon.
That’s why this side is wedded to the other:
if you want to understand computers, you can take
the first step by turning the book over. I figure
that the more you know about computers-- especial¬
ly about minicomputers and the way on-line sys¬
tems can respond to our slightest acts-- the better
your imagination can flow between the technicali¬
ties, can slide the parts together, can discern the
shapes of what you would have these things do.
The computer is not a limitless partner, but it is
deeply versatile; to work with it we must under¬
stand what it can do, the options and the coats.
My special concern, all too tightly framed
here, is the use of computers to help people
write, think and show. But 1 think presentation
by computer is a branch of show biz and writing,
not of psychology , engineering or pedagogy.
This would be idle disputation if it did not have
far-reaching consequences for the designs of the
systems we are all going to have to live with.
At worst, l fear these may lock us in; at best,
1 hope they can further the individualistic tradi¬
tions of literature, film and scholarship. But
we must create our brave new worlds with art,
zest, intelligence. and the highest possible ideals.
1 have not mentioned the emotiona. Movies
and books, music and even architecture have for
all of us been part of important emotional moments.
The same is going to happen with the new media.
To work at a highly responsive computer display
screen, for instance, can be deeply exciting,
like flying an airplane through a canyon, or
talking to somebody brilliant. This is as it
should be. ("The reason is, and by rights ought
to be. slave to the emotions." - Bertrand Russell.)
In the design of our future media and sys
terns, we should not shrink from this emotional
aspect aa a legitimate part of our fantic (see p.
) design. The substratum of technicalities
and the mind-bending, gut-slamming effects they
produce, are two sides of the same coin; and to
understand the one is not necessarily to be
alienated from the other.
Thus it is far the Wholiness of the human
apirit, that we muat design.
(c° V£ S)
<Qlr Qmwtv-f
fae*' L<,
ckxifaot. aj
Jurc^srdjyfr yters
tivrmV
0 a r )
AUTHOR’S COUNTERCULTURE CREDENTIALS
Writer, showman, generalist. Gemini, moon in Libra, Gemini rising.
One \me seventh-grade dropout. 1 have relatively little interest in improving the educational system within the existing framework.
Author of what may have been world's first rock musical, "Anything 4 Everything." Swarthmore College. November 1957 (with Richard L. Caplan).
olographer for a year at Dr. Lilly's dolphin lab (Communication Research Institute. Miami. Florida). Attendee of the Great Woodstock Faatival
(like many others), and it changed my life (as others have reported). What we are all looking for is not where we thought it was
I elong media nut. Magazine collector; hung around TV studios as s child. Compulsive explainer. Gimmicist by disposition, computerman by accideatlny.
Lit
irem.
<5urri£MEUT
TO THC THIltj) rtiNWGr
II 7 S.
© it7r Ti«“l®* r ft* Mr**,
Gee whiz, folks, here we are at another prin¬
ting and already the big clock on the wall tell,
us that another year has gone by.
This supplement is mainly things that had to
be mentioned, but it kind of assume, you We read
the book itself or are generally
computers. BOOKSTORE BROWSERS: avoid these four
pages. NEW OWNER OF THE BOOK: Check that the
pages are right, riyit,
SORRY THE TYPE STILL ISN'T BIGGER, but that
will require thousands of bucks in new negatives—
meaning a lot more have to be sold »s is.
The redoubtable PCC is now six issues and six
dollars a year. People's Computer Company,
P.O.Box 310, Menlo Park CA 94025.
BYTE Magazine, $ 10/year if you hurry, $12 later,
from Creen Publishing Co., Peterborough, NH.
Editorial: Carl Helmers, Box 378, Belmont
MA 02178. Hardware-oriented.
Creative Computing : The Magazine of Recreational
and Educational Computing . Ideametrlcs,
P.O. Box 789-M, Morristown, NJ )7960. Weird
variety of subscription rates: student $6,
"individual" $8, "institutional" $15.
The Computer Hobbyist , $6/year. Box 295, Cary NC
27511. Hardware-oriented.
Computer Notes (for Altair users; from M1TS).
Micro-8 Newsletter , for people really into the
Intel. Hal Singer, Cabrillo High School,
4350 Constellation, Lompoc CA 93436.
and also
Simulation and Gaming News, Box 3039 University
Station, Moscow, Idaho 83843,
Electronotes is the magazine for music synthesizer
freaks. Bernle Hutchins, 60 Sheraton Drive,
Ithaca NY 14850.
and something else entirely.
Privacy Journal , a monthly newsletter on problems
of privacy, many or most of which involve
computers. P.O. Box 8844, Washington, D.C.
20003; $15 a year.
(Note: it is of interest that a bill on computer
privacy in this year's House of Represen¬
tatives Just happened to be HR 1984.)
One individual I know, who relishes his
counterculture image, told me with angry and
shaking voice that he doesn't believe in copy¬
right and that anything that gets near his
computer belongs to him . Well, don't leave
your manuscripts near such a person. (Why is
it always the guys with cushy and secure jobs
who tell you tveedle de dee, ideas should be
free, and patents and copyrights are selfish?)
Actually, for the individual, one of the
strongest forms of protection available is
copyright. Far from obsolete, the copyright
makes publishing, and the betrer computer
software, possible. (It is not generally
known that copyright violation is a felony .)
(And ripping off a program you're supposed to
pay for is not a brave guerrilla affirmation,
like hitting Harold Geneen with a pie, but
grand larceny.)
Now that Altairs and LSI-1Is have got a
lot of you guys dreaming about selling soft¬
ware, an important question is how to protect
your work. Well, you have a champion.
Calvin Mooers (see pp. 18-21) is not only
a genuine Computer Pioneer From The Forties,
but, along with Herb Grosch, pioneered the
Computer Counterculture. Grosch flaunted a
beard in front of old man Watson, Mooers
strove to make computers easy to use— back
when that was unheard of.
One of his current interests is in ways
that small independent underground-type pro¬
grammers can protect their developments. He
and some associates are exploring the possi¬
ble formation of a group for the legal pro¬
tection of small software producers and owners.
Incidentally, when you think something
you've written belongs to you— a computer
program, poem or whatever— slap the following
at the beginning, under the title:
© 1975 frving Snerd
substituting, of course, your own name. And
the year currently in effect. If computer prin¬
ting is used, (C), using parentheses, is consi¬
dered an acceptable substitute for c-in-a-circle.
This not only gives notice to potential
Borrowers, but it has certain strong magical
properties as a legal incantation. See your
lawyer for details, but don't hesitate to apply
it liberally to your own work; you may be glad
you did.
A lot of copies of this book have not been put together correctly.
We hope that's all ovar now, but If this book belongs to you
please check it. Incorrectly-made books will be exchanged,
within two weeks of purchase (address on p. 2). Otherwise
you have a Collector's Item. Q ^ /
ALL YOU NEED DO IS CHECK THE NUMBERS ON THE 'COMPUTER LIB' SIDE.
They run straight through from cover to cover, even thouqh
the contents flip capriciously. If the letters "OM” appear
anywhere amongst these plain numbers, you got a lemon.
Tiie Aim swcr
It began with a bang last Christmas: the
cover of Popular Electronics showed 'a computer
you dan build yourself for only $400'!
It was real. A young firm in Albuquerque
called Micro Instrumentation and Telemetry Sys¬
tems, or MITS, had finally done it: a computer
for well under $1000. In a box not much bigger
than a typewriter, a machine comparable to the
Univac I. They called it the Altair 8800.
Of course, In a way this was an obvious
Btep. The MITS computer was simply the pack¬
aging, as a computer, of a specific integrated
circuit chip that had been on the market for
some months. This chip, the Intel 8080, is a
microprocessor, or two-level computer (see p.
44), generally employed for fixed purposes in
cash registers, pinball machines, and the like.
However, to make It a "general" computer— with
the engineering, hookups and accessories that
entailed— would be no small c-atter if taken
seriously. ^ ^ „!,**)
Next in computer hobbyism will
obviously be the Computer Van.
Already vane come with swivel
thrones, four-track stereo,
color TV; so this next step
is obvious. But most important,
recreational vehicles can be
purchased on very long time-
plans, sometimes seven years.
(HITS has a detno van with Al¬
tair, floppy disk, lineprinter.
It drives around showing off.
But they'll sell you one like
it for a trifling $20,000.)
Now for mobile operation we
redo the power supply...
1975 may be thought of as the year in which
the computer underground suddenly appeared In
full force. The Altair was probably the big
crystallizing event.
Not that there wasn't a counterculture be¬
fore. There were the games-players at every uni¬
versity, the prank programmers (see p. 40-9), and,
wherever computers are the center of things, a
shared experience of miscb^ief and breakthrough.
There was Computer People for Peace, a cliquey
and unapproachable group with booths at the con¬
ferences (at least, their backs were always
turned when you wanted to ask questions). There
was the hobby fringe.
But now it's gone different. Instead of
pretentious company names meant to appeal bo ob¬
tuse businessmen, like Performance Measurement
Systems Consultants Group and Bottom-Line-Tronics,
the new companies have rock-group names like
General Turtle, Inc., The Sphere and Loving Grace
Cybernetics. In this new computer counterculture,
the main computer companies are not IBM and
Honeywell and Univac, but DEC and MITS and Gen¬
eral Turtle; the standard computer is not the 370,
but the 11 (or possibly the Altair or the 8) .
The standard language is not Fortran or Algol or
PL/I, but BASIC. Instead of the big color TV
that middle America wants, the underground compu-
ternik dreams of his own graphic setup forever
running The Game of Life in color (see pp. 48-9
and pic p. DM26). (Of course that'll also re¬
quire the color TV; see "Bit Maps,” p. Z.)
In such a world, computers are not a tool
but a way of life. The computer is toy, pet,
checkerboard, music box and TV. Computers are
for making music, computers are for getting people
together via community memory, computers are for
letter-writing, computers are for art and movie¬
making and the animated decoration of the home.
w
Computers are for games; a vast number of
interactive game-programs are published and
swapped around. Almost all are in the BASIC
language. (Bob Albrecht's WHAT TO DO AFTER YOU
HIT RETURN is said to be definitive— S7.50 from
People's Computer Company, 1919 Menalto Ave.,
Menlo Park CA 94025. See also their magazine
PCC , as well as Simulation and Gaming News.)
PLATO games, a somewhat different subspecies, are
discussed on p. DM27.
The underground computer magazines have be¬
come a blizzard (see box). Albrecht's sprightly
and successful PCC , originally oriented toward
high and grade schools, has now branched into
hobbyism as well. On the hardware side there is
The Computer Hobbyist , and now a slick new hobby
magazine, Byte , with a first printing of 50,000.
On the educational side there is a swell new
magazine called Creative Computing .
Then there is the Community Memory movement.
The basic idea of Community Memory is to have a
computer resource of information and ideas, com¬
monly available. In its more glorified and mys¬
tical form, the idea seems to be to have a place,
inside the computer, where information can be
shared by The People, free of institutional ob¬
struction or the profit motive.
This vision is perhaps unclear to others
besides the author, but it attracts a variety of
people interested in some form of grass roots
revitalization of our society. Some of these are
disillusioned sixties radicals who look to "com¬
munity organization" as a building block for a
new society; others are interested in more nuts-
and-bolts applications, such as trying to make
barter a viable economic form again, in an urban
society with many nonstandard leftovers, skills
and wants. (Presumably this would work by having
the computer find pairs of people with matching
wants and tradables; or even search out potential
trades around multi-person rings.)
The first of these systems was Resource One,
in San Francisco; I saw another Community Memory
in Vancouver, which seemed to be in practice a
sort of animated classified-ad system. A user
Bitting at the terminal can put in ads of his own,
and can search through the entire file for key¬
words of interest. As there is no censorship,
some rather surprising things get in there, for
which I wish we had room.
(A newsletter of such projects, Conmunity
Communications , is being started by Lee Felsen-
stein, Loving Grace Cybernetics, 1807 Delaware St.,
Berkeley CA 94703.)
Even for those coming anew into the field—
the radio hams and amateur telescope makers who've
laid their Master Charge cards on the line for the
Altair— computers represent a new social life.
Amateur computer clubs have drawn startling num¬
bers: for instance, the Los Angeles and San Fran¬
cisco groups are currently pulling 100 members to
their weekly meetings. (In San Francisco, con¬
tact Fred Moore, 558 Santa Cruz Avenue, Manlo
Park CA 94025.)
This book and its surprise success probably
rate mention of some sort in the world of under¬
ground computerdom, '74-75; although my under¬
ground status may be in jeopardy. I had intended
to bypass the computer establishment, and cer
tainly not expected to become assimilated therein;
so the dozens of university class adoptions have
come as a considerable shock, as have the accep¬
tance and legitimation I had long since given up
on. My heartfelt thanks for this response, and
I'll try to live up to it. ( Ho* i“ discussed on
p. Z, last column.)
But folks, this all is the merest beginning.
Ae it saye on diametrically the other side, p. 3,
COMPUTERS BELONG TO ALL MANKIND.
(19 Zl
OfaTf
PAGe
• • • • •
BIG SfPTHef,
^Nj>^-ne-r$*r
d.rtwy" 11 '" •" » v **» rd <tut, opposl"g lead
attorneys accused each other of professional
misconduct, placing both men's «<MI under *
cloud »■ the f »« ht
th« ««y 1C c < p m through In th« tr«4* pr«**
tha Gowsrnmeflt MOM to fa* pulling punch— and
>i»lt« th* point Of what It* own *ltn**M»—r-
It Ur
CosqnJlsr Industry Association, or ISM-hat:
club. of for* transcript* of th* IBM trial,
Mil ■> daily itHitlH. Th* 9 rot
t*r> in now at 1911 X. fort Keye:
Mhat
s th* point of It *117
1* ***kin 9 to break up I
ITT- liartford business.)
Thor* 1* • lot of *up*r*titloo »faout I HI
In th* land. Th* stock aarlat toot a hug* dive
wtMn th* Justice Department announced It Mould
pro**eut*. hut why? H*ah wiener, editor of
Ccwmtar Decisions■ think* IHI will fa* brok*n
upi *Tha Jostle* Department want* It, and 1HI
want* It, and th* stockholders will eaks won
*on*y. They've already drawn th* dotted linas."
A k*y question 1* whet difference It would
oak*. is—her shet happened after they broke
up Standard 0117 Mot euch-l A phony hreakup
would *l**ly —k* th* different division* Into
different «-pan!**, leaving tha product 11 m
and th* cooperation intact! a oor* effective
■pill would in eoM way fostar competition
among th* daughter corporation*. But what way7
On* of I HI* * nor* r*c*nt trick* 1* to
or.rwh*!* litiqstor* by th* quantity of doc-
unant* tuppllad, nany of which ar* stored on
computer* In full-t**t fons. To give you an
Idas of tha humungous magnitude* involved, some
figures Just came up In recent litigation with
Senders Associate*. Sanders Is suing last, and
recently asked 1M how many doci»ent* IH1 had
that w»r* 'partinant' to th# cas*. Th* reply:
'Active file*, approximately 906,014,000 pagesl
Inactive file., approxlnatsly 421,(60.000 P*9**.‘
( 0 *tarnation , July 71, p. 129.) An unfortunate
aftermath of a suit by Control Data, In which
IBM settled, mi th* destruction of th* greet In¬
dexes which had baan constructed to tha vaat fil*
of IP's record*t th* indax Is gone and unsvsll-
abla for thi* cas*.
To a lot of people thi* Just sew to have
to do with th* else of on* corporation. In th*
author*■ opinion, howavar, th# l*su* 1* th* on#
big usual question, the l**u* of freedom in our
time: and that 1* not a mat tar of bignass, but
tha styla of IfaX'a control. Computars should
sake things sasiar in both our work and our pri-
vat* llvas, and should help lighten our loads
and anlightsn our minds, clarifying th* cosplex-
lties of everything. Unfortunately. IM't method
of staking money has a littls too much to do with
creating rigid and oppressive and pointleaaly
ccMplex lyitmi, fobbing thaw off as 'scisntlfic, *
and ensnaring its customars in complications by
tha techniques discussed on pp. 12-66.
People should b* free to uaa computars as
they ought to be used, each In his personal style
regardless of his job title, smldst rushing menu*
of option* snd clarifying screen graphics, rsthar
than each parson and office worker being locked
Into his own "sternly allotted sandplls,* as
namings put it. And that is th* problem.
able to report In future edition* of thla book
that ml has moved firmly and credibly toward
making Its system* clear and sl^le to us*, with¬
out requiring laborious attention to noodle* com¬
plication* and oppressive ritual*.’
This has in fact occurred, and 1 so report.
In an earth-shaking announcement in January,
ISM totally reversed th* policy of it* cxMputer
division for th* laat ten year*. Tat eo jaded is
th* press that thi* event was not, 1 think, pro¬
perly raoognlied.
Astounding s* It may be from the company that
gave tha world JC1. and 'ha MT/ST, In January IHI
stepped into th* world of MI) CO—'Uter., bringing
out the iystem/32, a mlnlcosputar for bualnes*.
You can only rant it as *n interactive terminal,
with a program created by IHI which cannot b# modi¬
fied (celled an Industry Application Package or
IAF). hut those little progrems prompt user*
*t*p-by-*tep through what they ar* supposed to b#
doing, and apprantly are very clear snd helpful
for th* naive.
This about-face Is In many way* gratifying
for those of us who have bean advocating easy,
screen-based systems for year* and yaara. kt long
last it gives IHI’* 'legitisMcy' to minicomputers
for business, and it help* companies that already
provide such ssrvicss, such a* Baalc/rour.
It will be interesting to see if IHI know.
hom to make things simple, considering th* exper¬
ience they have lavished on the opposite policy.
Anyway, with this mov* I would say that IBM has
purged itself of at least 20t of Its discernible
evil. If this begins s real change.
A delicate probl— will restrict th* impact
of th* 32 itself, however. That Is that thH wants
It used only si s gateway to Its Mj computers:
prssiaasbly, If users war* altowad to program it,
they'd find way* out of having to use th* blggia.
WAT UOL J* HtkT?
As It happens, w* know what I Bn 1 a biggest
nsxt mov. will be. It la sow.thing to be callsd
tha Putura Systm* (rsl. PS will be a cocq> 1st*
line of co—Altars and crxssnmi cat Ions technique,
for them, but that's *11 we know: security it
vary tight- Supposedly fS exists and Is running:
but what l£ it? All we know is that Its schsd-
uled Introduction hat been pushed back from 1976
to sometime after I960.
Anyway, I hsv* asked a lot of savvy people
what they thought PS was going to ba, and her.
•re some of th* answers:
k completely modular line
terminals with a Unlbva-type architec¬
ture. (RtimoRi this would eliminate
sre, CEs end System* Analysts. Thu*
th* postponement.)
A nlcrprogmad line of equipment, whose
A totally Pl/I system.
A line of equipment with ever-changing
mlcroprogrmnad "fen-dance" interfaces,
t what they era. (A
charge by barb Groech and numerous
peripheral manufacturers.)
A complete and impregnable total ays ten for
all symbolic information, which can
only be keyed into through IBM terminal*,
processed on IBM computers, trsn— itted
through IBM satellites, end read out
through IBM terminal.. (PACT: IBM has
eppllad for a satellite.)
Totally CO—mtlbls with existing 370 hardware.
Totally incompatible with existing 370 hard¬
ware, but software-convertible. (IBM
makes a lot of money on adapters and
conversion*.)
A line of pockat-sized and portable equipment
built around Magnetic Bubble Technology.
A line Of sasy-to-uae equipment V1 th easy-to-
use interactive software. (This would
suddenly eliminate hundreds of thousands
of progreamars. but IBM doesn't owe than
anything.)
"Kan, Whatever It Is, it'll be sick."
ner.cy Toy, The Gun never Sets
viewsd at prass time.
William Badgers' Think is out
•n idded chapter, from th
Library.
Datamation devoted large sections of It* February
and March ‘76 Issue* to material on the IBM
Problms.
THeJifrDC ,
1 - th: a Whocr-er:
HAJOB PREMISE. "Computers era so cospilicatat
only a company ex large as IBM can put together
th* technical teams necessary to mak* th— work."
Ttfc COROLLA*Y. 'Computers sr* to complicated
that there’s just no way to make It possible for
competitors to hook up their equipment to ours."
cVBtwy 7 r
: th* Dutchess County Pair this year, there
was a 'computer handwriting analysis* booth. Too
wrote your name on a card (Hollerith, natch) and
this was put through a slot. A typewriter (marked
"IBM") printed out the "analysis."
e brazen fake. Presiawbly th* typewriter was an
ordinary Hag Card Sslsctrlc, Memory Typewriter or
th* like. Th* flathoua* operator could aimply
choose what he wanted the printout to say by th*
Insertion of a card (on tha former) or th* twist
of a dial (on th* latter).
Incidentally, while 1W la probably th* prin¬
cipal employer of Dutchess County, we should not
as sums direct complicity.
ihib»m<;
Soma useful words fi
problem. (Th
in which acme
©1973. 1976
*W 0ff«df Of-mefUMe"
30, 1975) carried a 3b-page section called an
"executive briefing," whatever that is, on th*
office of the Future, whatever that is.
Th# article was actually two thing* spliced
together; "futuristic" gab around t>m title, and
* report on th* so-called "word processing in¬
dustry." Word processing, a silly IBM tarn,
naans handling text by tricky office equipment
(see "Type Rlghtsr," p. 14).
IBM controls th* word processing market,
discussing th* IBM wlth *“ ch machines s* the Mag Card Selectrlc and
:« Decision* magazine. th * abominable (in my opinion) MT/ST. As re¬
vere first published. ported by Buaineae Meek , IBM's basic strategy
■ Ms Ison.) Is to tsll businessmen that they have to have a
centralised typing pool of specially trained
typist* to us* these things, so th* office has
to b* reorganized. The secretaries hats th* new
organization because it makes tha* into keypunch
operators— th* paon/ssscutlv* dichotomy is a
traditional aspect of IBM products, It would
' but th* whole thing is put over as Modern.
Mow taros hae coma up with a co—latltiv.
machine, the B00 (aa* Diablo, p. y), and Businas.
Majk Intones that only the., two firms have tha
savvy and capital to auccaad In competing bo
craata tha office of tha Future. Wall, this la
•clime tic
puxzlingly ibmiah.
Umbrogllo
im software.
Umclogi—
cl—ay or inappropriate term, asp. one
Idlieh misspeaks Itself, ,uch as "random
access" for cyclical access, "direct
“ * " for indirectly accsssibls
lrtual system* for rstl
ng virtual huge matory
denies, a
•yet— in
leclmel
trying to put a
»-l0.
mslly Organised, Rbitrary Kludgi) .
ihmolatry
worship of IBM.
ibmecile
someone Umeraad i
^ y U! ‘ ty *°9.thar«<.a ° f
ItmocuS "*"** tm - if *W
iCpertIC* 0< Dy tha 4
Th* big alstaka IBM a competitors always
***m to make 1* to let IBM define th* problem,
end then go in to try to compete on th* battle¬
ground, and in th* tarsia, that IBM has laid out.
But it Is not sensible to play follow th# leader
on slippery logs through a booby trapped sweep.
Mow Xerox hae stspped onto tha Ilippery log.
But th* right thing would be to unmask th* ab¬
surdities of tha IBM game with new initiative*
«nich thmy cannot possibly
Th. office of th. futura. In th. opinion
, **“ Aubhor, will have nothing to do with th*
typing. It will
have screens, end k.ytoarde, end possibly *
printer for outgoing latter., but po.albly not.
All your business information will be callabl.
to tha Kite, instantly. An all-embracing data
structure will hold every form of information
-- ruses rice] and textual-- in a cats’-cradle of
linkages: and you, th* near, whatever your job
1 ^*‘ qulckl J7 * rov * screen through th*
entire lnform.Lion-ep.ee you are entitled to
, T ° U v111 to do no programing, and
lndsed progrsme" will never be explicitly in-
* u ' they Will e Imply take affect aa
* display apace, something
A display-driven informa-
*hich n««ds upd*t_*.
>°>z\
ft
TKC Sfor z
tmputer
going to challenge IBM head-to-head for d
of tha whole broad field of Information, whatever
that ia. Xerox mad* copiers, but saw tha hand¬
writing on th* drimi eventually the handling of
vTlttan materiel* would cross over into th* ctx^ni-
futuze directions that have baan proposed, see
Engelbert, pp. DM46-7, PLATO, pp. 0M36-7, end
Xanadu to _ pp. c*€6 6-7.)
Tha laat July lasua of Computsrvorld in ’76,
however, tolled of Xerox’s abandonment of the com¬
puter field. Bpeclfically, Xerox will stop making
erssputars thamaalves, though they still will make
accessories such *a til* hot Diablo printer (see p.
Y). TTw news was presented In the framework of
grand tragedy, the Promethean collapse of overex¬
tended ambitions. Evidently Xerox management
pushed too hard in two incompatible directions—
building slowly for tha eventual challenge of IBM,
ve. showing profits quickly. The firm fell be¬
tween th* boat and th* dock, joining XCA and Gan-
found they couldn't mak* it sailing computars.
But Xerox is not aa far out of th* fiald as
soma eight think.
In a secret mountain hideaway-- wall, not too
secret— Xerox still has perhaps th* sharpest
bunch of coaqmtar rascal* in th* world. And they
are planning way way ahead, to the time compute™
•re practically fraa. If Xarox gives them thalr
head, and doesn't cut back, th* corporation will
have little trouble in trlimtphantly returning to
th* fiald five or tan yaare from now, conceivably
knocking IBM off its fast in the new markets of
that day with a karate-tike sweep.
Thla Fiscs of Power Is called Xerox Falo Alto
Research Center, or Xerox PARC, end its atmosphere
Of California Hallow can mislead th* unwary.
I apok* there a few years ago and found it
an astonishing exparlance. First, there was a
busy volleyball gam* outside whan I arrived, and
whan I asked for tha person I wa* going to see,
the rsceptionperson said to pull up a beanbag and
wait till he had flniahed playing volleyball.
furnished only with a mountain of thosa beanbag
sacks. As paopl* cams in, they would pull besnbags
off the mountain and ait down on them.
so far so good: California Mellow. So 1 went
into my rap, and everybody sat listening. I had no
Idas If I was getting through. Since what I try to
tell paopl* begins where technology stops— moral
precepts, a* It were, for organizing idee, end eys-
tmi in the world of the future (ess this whole DM
side)— I'm used to people looking confusad, or
worried, or angry, or even walking out. There vex
none of that. Has I getting through? Or wets they
all jutt atoned?
I think I just sort of stopped and said, "Is
everybody following this?"
There were smiles and I think somaone said,
-Me'r# with you. Tad."
And they ware. It was th* only plac* I'v*
svar spoken where tha audience was on th* same
wavelength, going straight on Into Syataw Daalgn
for Putura Man. Vary moving.
This ia obviously the place to tall you about
Alan May snd tha Dynabook.
Tha hottest project at Xerox FARC is Alan
key's Dynabook, formerly th* Kiddy Computer. As
lots of people will tall you, it's going to cost
five hundred dollars, b* nail enough to carry
•round on a shoulder strap, have a built-in screen,
run on batteries, and have all tha books a kid
wants to read from the screen stored on a cassstts.
And tha demos) They'll knock you out. Qn a
color TV screen, they'll show you a wildly changing
pageant of toy soldiers, photographs, beautiful
patterns, all generated by th* computer in real
time (aa* "Bit Maps," p. Z). And if you'r* into
computars, thay‘11 show you how all this is run by
th# beautiful SMALLTALK language (It was previously
s lot's
• all o
•calved registration f
"me hwv fevn."
"iec.iS 6 frm(&L'pe w
IS a complaint you hear evarywhara. Th* ritm-
blanca 1 . certainly not in mal.amanahlp— ha ha—
but In tha way that the standard answer to quea-
tlons has now baccm*. ‘1 don't know, thst'a not
ay department. * Faopi. feel this with • certain
bittern*., because *> .any of DRC'a far., loved it
for not being ilk* IBM. it's ilka when Jackie
Kennedy married rjnaasls...
Despite its steadfastly insipid marketing,
oonaolidatad its position at the canter
of th* «ell-c<mqx)t*r semistrcm, snd the PDP-11
consolidated *• the emal 1 and madlim-
slcad computer of choice among sophleticatea.
(The PDP-11 Is also attracting con aider able in¬
terest • • e network computer. In on# curious
Instance, First Rational city Bank of Mew York
is creating a network of 11/45*.)
NEWS tm THE 11
tar to rang* In alia, genuinely, from th* tiny
to th* grand. During tha last six moot he, DBC
has brought out the smellaet of tha Una, tha
LSI-11, all on a board the alta of a sheet of
typewriter paper, for BIX HIHORED AMD FIFTY
DOLLARS That includes tha full computer and
4K of volatile fast memory, aa wall aa built-in
Thar* have been a lot of cons In
field, but this Is not one of than. It'a marvel¬
ously real.
f laid?
Answer; they're not exactly leaving; they’re
taking a break until they can sail this beauty
for fiva hundred dollars.
Wist** tha delay?
Th* Dynabook, or Kiddy Computer, Is actually
a POP-10.
You're supposed to laugh. A PDF-10 Is a big
cosvutar, tha bast. (Sas peg* 41.) A PDP-10 sys-
tam costs hundreds of thousands of dollars.
But tha laat laugh will ba Xerox’a. Th* way
computer prices ax* coming down, through inte¬
grated circuits avar more powerful and cheap, that
PDF-10 can h* sold for 3500 in... (check your
choice) _1976 _1979 _I960 _1981 _1983.
(Interesting anecdote: tha guys at xarox PARC
asked to buy a PDP-10, but management bridled,
seeing as how xerox was in tha cosiputar business
and mad* competitive machines. So th* fellas,
nothing daunted, built thalr own . They modestly
say th* parte only cost a few thousand.)
(Nota: the above predictions era based, of
course, on tha aasimptlon of Xarox management
knowing What it’a doing. Assumptions of this type
in tha computer fiald all too often turn out to b*
without basis. But wa can hop*.)
Th* TRAC®Language Is now running time-shared,
for general customars, on Ccmputility (as men¬
tioned on p. 21), and In • fancier Version offered
by Interactive Sciences Corp., 60 Brooks Drive,
Braintree, Haas., 617/646-2600. Hooers has li¬
censed the latter firm to run both his basic pro¬
cessor snd "Advanced Developments" (rather **cr*t)
in fils system* and computer control. Apparently
he has soma spectacular data-baa a stuff In thars,
but you won’t b* able to find out about It directly.
Special packages are tha specialty of Interactive
Sciences, and with TRAC they can offer packages
with both tha data baa* stuff snd other unusual
capabilities. For instance, this time-sharing
TRAC can itself call up other computers and sign
user.
Tha Ccmputility version aaama to run for
312 an hour, tha Interactive Sciences version
In selling whole packages, not usar-dlddling.
Is not quits th* full story. This LBi-11 1*
without power supply and without tlnibua. In¬
deed, U seeis that the LSI-11 happen to b*
th* vary earn* thing a a tha 11/04, demurely an¬
nounced last fall, which costs (2500 with power
supply snd Unlbus, no front penal. Th* an¬
nouncement of tha LSI-11 than takas on th* ap¬
pearance of a reply to tha grand HITS announce¬
ment of January (aa* p. »). Especially whan it
turn* out that If you want one LSI-11, it costs
• thousand. ("Buying clubs" an being formed
with th# ids* of pawling resources for tha
quantity pries: ata "Cheap Computer#,* p. Y.)
(Sophisticate* interested In putting th*
LBI-11 in other equipment hsv* bean quick to
notice an unusual feature■ it hae an empty socket
In which you may insert tha RDM that gives you
floating point (• vary cheap option). For those
of us who daydream shout unusual functions, such
• • Hat procsssing or graphics or tha llks, this
Opening la vary suggestive: with access to tha
microprogram instructions, a different BOM could
b* put In for feat Implementation of whatever It
was you wanted-- snd your program would use for
your nefarious purpoaai ths binary commands or¬
dinarily reserved for floating point.)
(While ha may not ba able to deal with that ,
a vary savvy source parson for ths LSI-11 Is
Daniel L, Lewis at DEC In Rolling Kaedovs. Ill.)
At th* high *nd of th* lin«, a bl* PDP-11—
tha modal 70— has baan unveiled, revealing a
full 32-bit machine, in th* hundred-thouaand-
doliar class, with cache memory and time-sharing.
(But what of th* even bigger PDP-11 modal 85,
rimorad to b* whirring its thirty -six bits un¬
seen in the Marlboro plant under yet another
operating syatmi? Hill it mean that all th*
other 11a have had two more bits all this
time? Ah, pity that nothing can be said about
Multiple operating systems are. Indeed, th*
ban* of th* PDP-11 lln*. Mot only Sr* thars
DEC’S own, llks R5TS. FT-11, DOS snd R5X. which
suffer from a lack of fils compatibility and
scmetlma* won't even run th* asm* object coda;
but now thera has arisen a tar grander operating
system, (JRIX.
UNIX— th* nam*'s sug9«*tlvsn*ss of ha ram
guards la deceptive— is really the eon of MUL-
TICS (see p. 45). But it was flniahed in much
less time. Like Multics, it’s • beauty. Like
Multics, it was programmed in • higher language:
the language it's programed In, howavar, is
called simply "C". Ths language was created
by Brian Karnlghan. author of a widaly-pralsad
book which ha audaciously exmpilsd out of In¬
correct progreaming example! from other people’s
books on programing. Unix itsslf was program¬
med in "C" by Kan Thompson and Dennis Ritchie.
Unix Is a dmaon. Aside from all tha usual
feature*. It allow* programs th* magic proparty
of splitting . Each program can throw off copies
of itself, •.
salves initiate further
apprentice structure comes mainly from a Nor¬
wegian language called SIMULA, and also appears
in Alan Kay’s SMALLTALK language at Xarox PARC:
regrettably, there Is no room to discuss these
hare. (Por Simula. ••• 01e-Johan Dahl end C.A.R.
Hoars, "Hierarchical Program Structures," In
Dahl, Dijkstra and Hoar*, Structured Prograxmlng .
Academic Press.) Thaaa feature# affactively
Chang# th* character of programing completely.
For instance, to simulate a number of objects
interacting, tha program c«n spli\ off a copy of
Itself for every object, and each copy (mimicking
tha real-world object), can than respond to its
continually-changing environment as required.
In other words, this type of language means that
programs behave much mere like tha things being
simulated than they ever did before.
SIMULA coats 320,000, and, as it happens,
UNIX costa $20,000 (fraa to non-profit organisa¬
tions). Unfortunately this raises certain grave
questions, sines tha telephone company (of idiich
Ball Labs is a branch) la not supposed to ba in
tha computer programming business: and thosa who
are in the business ar* dismayed by the idea of
DEC'S OTHER COMPUTERS
Rather than throw its corporate weight en¬
tirely behind th* PDP-11, DEC hat carved out
certain areas In which it la trying to market
Its 12-blt and 16-bit machines, tha PDP-B and
POP-15. Tha PDP-8 is being pushed for business
applications, with DEC’S COBOL-llks language:
also a vary nice version of ths S has appeared,
an excellent home computer, with 6K of cars, ti»
floppy disks, kayscopa, and wwt-printar option)
this is th* "Classic," st 312,000.
Tha 18-bit POP-15 Una la still being mar¬
keted. Parhape In order to save it, it la being
marketed as a "madiia-strad" machine, with KNCPS
(DEC'S date-bass systim), with virtual huge mem¬
ory , and with hot displays.
COMPETITIVE LOOKALZRZS
Imitation of DEC computers is continuing.
On* firm, Intersil, has put tha PDP-8 on
a chip for ks< 3300. (However, ee It usually
turns out, by ths time you gat all th* parts to¬
gether It costs 33000 after all. But In quan¬
tity it's another story, and tha individual price
will drop soon enough.)
Intersil has also Intimated that they era
working on a chip to simulate th* PDP-11. If
so. this will of course bring thm smack up a-
gainst th# patent that isams to have knocked out
tha Ol^ltsl Computer Controls lookallka,
11 lookalike, mention
tlKMiCfllfr fan pjf
THE HWHStohyM-)
But M1TB took It seriously, sod offered
with the Altelr a email but complete lias of
terminals, disks, printers. Interface#, and,
moat Important, ears tea facilities.
The firm had Inn or. ted before, notably sfcae
they brought out the first hand-held calculator
several years before. Just aa they correctly
anticipated that demand, they foresaw this ana.
They also chase unerringly the right mar-’
kat to begin on: electronic hobbyists and klt-
bullder*. Th# kit-aeker enjoys tha challenge
of building a machine from only a diagram and
a box of part*; and to be far from a repairman
hold* no terror* for hla. for he le the repelr-
The price drop was not an dramatic a* it
might sen to tha general public; nor is the
computer quit!
glance. Conti . . _ r ,
ted by IBM and a muddled
that computers srs huge and cost Billions of
dollar!, very good compute™ have been availa¬
ble lately for a couple of thousand, not coun¬
ting accessories.
But th* accessor las present a probltm.
On that score, the apparent rock-bottom price
of tha Altalr may have been misleading, espe¬
cially to klt-bulldere. A computer Itself la
• limp dlshrag without memory, terminals and
programs-- all of which pad ths cost of tha
package, ly tha time you’ve added IX memory.
• terminal and BASIC software to your klt-
bullt Altalr, a thousand dollars has flown
(31400 If you buy It already aassmblad). Than
if you want tha disk (and who doesn't), that’s
st least fifteen hundred Hr*.
Now klt-bulldere just starting may not
sea th* point of all than* fripperies; they
•ren’t used to powers like that of • full com¬
puter, SO coming to real Its the lamenslty of
It all nay be • gradual awakening, with many
happy soldering experiences on the way. Others
may be brought up short as they sens* what
they're getting Into.
This Is pertly • problem of HITS’ trying
to reach two consumer groups sc ones: th* kit-
bulldar, who may hav* thought a computer was •
(sney switchbox, snd now must enter 1 world he
doesn’t know, and the computer sophisticate,
who looks at ths bottom line for ths cost of
• complete package.
Indeed, HITS' low pries* aren't that low.
When U comes to price, they srs about 50* ahead
of the conventional competition. For Instance,
their 35000 setup (with terminal and dlek)
might b* taken as roughly squlvalent to tha DEC
Classic st around 310,000 (see p. Y).
But vhat you usually pay for In this field
■ service and fringe benefits. The fundamen¬
tal t
(Thsy a
e back to the c
roblea
rreapondence about thalr
troubles.) HITS' principal
contribution is raally In the thought they have
given to Chair market, snd the depth with which
they are serving it. They no doubt anticipated
competitor* who would supply accessories snd
undersell them (see p. T). But they see the
advantage in this: they svsn give out their
■ailing list to compadtor* who sail Altalr
■«*ory boards cheaper: They were not out Just
for • quick buck; they appear lo ba thoroughly
coHalttsd to full-spectrum computer service.
In eight months. HITS has gone from
tweney-fiva to a hundred employee* and sold
OVER F0UI THOUSAND C0KFUTE»S, which 1* some¬
thing tike two or three percent of the computers
In America. Today, the electronic nute: to¬
morrow. the world.
Bob Albrecht, caliph of counterculture c<»-
puterdom. highly endorses Altalr Extended BASIC.
Says It's terrific.
Th* main service center for Altalr* ham
baan th* Albuquerque factory, but tha fleet of
their regional service canters has now opened
In Nashville.
sf- H -1
HITS prices ars quit* reasonable. If you buy a
kit for anything in tha Altalr line. It's gen¬
erally about 256 lass than tha asaemblad and
fu) ly—checked—out version.
Tha basic computer kit costs 3439 (3621
aassmblad), but ignore that: It's llks a car
without an angina, easts or wheel. A ctaplata
package (thalr "Basic 1* sat) , with th* ecsqn-
tar. 8K of memory, terminal and «K BASIC lan¬
guage la 31391. A more high-powered system
with 12X of faa
is 36650, complete
There ar* many asperate item*, plans a
tloner it Is possible, of course, to b
packaged system from them for a* such ,
"‘AUWfcrsty ouuer
Naturally 1
n be in Los Angelas.
Is at 11656 Pico (at Barrington), Hast
L.A., h mils vast of ths San Dlsgo
Freeway, 213/478-3169. Hours era 2 to
8 Wednesday to Friday, 10 to 6 on Sat¬
urday and Sunday. It'a called tha Ar¬
rowhead Computer Company, and thmy
stock s 11ns of Altalr*.
SUKMCJ «( 6 <T.*
He Has only irai..c tor the BASIC-orisntad business
•yatama offered by URGic-rouB corp., to ba found
Aa you nay know, you can't In genaral juat
rant a computer (except from IBM) , but must commit
for ita full purchase pries, sine* th* falling
prices of cosgwtars mean it will probably hav# no
smrkac value In a few yeses. (IBM's great power
Stamm in large part from being tha only compute:
company big enough to rant.)
Hell, good old Digital Equlpmant Corporation
ha* finally gotten Into the leasing busineesi
They have started a ccaiputar leasing company. Digi¬
tal Leasing, In collaboration with U.S, Learning.
They will 1 sees Dec equipment to individuals of
good credit on tarma up to seven years. Currant
couldn't crash tha system.
(Tha Basic-Four setup uses • mini frsm Micro-
data Corporation. Hlcrodsta Itaalf sails a time¬
sharing business-type setup called REALITY, which
is highly praised by John X. Levine, another young
Vary much in th* BASIC game i# Nang Labs:
thmy offer • system with 4K, a BASIC Interpreter
(In firmware), display and cassette for under $6000.
Hang has cleverly farmed the local prog teaming
• network of software houses, each
s for thalr programs.
ickwily funny description of DEC ‘• hew
factoryp fairly iccuratt, b* found in * n*«t»y
bslletr latic book called Travels in Computer land
by Ban Ross Schneider, Jr. (Addiscn-Nsslsy. pap*:
d Jerry Fischer.
AC repair station.
Y
1
I!
&r\r(MR£
nits- »•* <****>*■<
sterol* MOO, snd *•
,300- But their Min
altair. * U«*
tntil BOW, and
already Into that machine will
way lat down, thay aay.
A ccaquiter hit based on tha Motorola 6000,
With 21* byta. Of cor*. ca.a.tt. recorder and
TV display < JZ ohara. by 16 lineal ia offered
for $1745 by ™I SPHERE, 9* Beat SOO south.
Bountiful, Utah 84010.
TWO computer kite, one built around tha PACE
and another a nova loofcallke, have aaan announced
bv Bill Codbout Electronics, Box 2355 Oakland
OMland CA 94614. Me also plana an 11
jookalika.
Or you eight gat an LSI-11. An LSI-11
buying pool la being foraied by Hal Laahlay,
Southern Cal Coagwter Society, P.O. Box 987,
raaadana CA 91030.
ss
Is
i 1
55
HITS haa a ’vary low-coat terminal’ (tha
VLCT, yuk yuA) for 1170 (4129 for kit).
processor Technology, 246 5 4th St., Berkeley
94710, make* a teat diaplay kit for tha Altair
for 5160 (you supply the TV monitor end evidently
the keyboard). 64 character per line, 16 linea.
A similar kit at a almilar price is made by
Southwest Technical Products.
Bootstrap Enterprises, Ann Arbor, are also
working on a similar unit, called ‘The Dumb Ter¬
minal," with a color option.
HITS ia coamitted now to building a video
terminal, the CT-6096, that will provide both
text and graphics. Following epeea are not final.
r»t« « T» 8t kS®«r /(coo.
It will have a keyboard and video monitor,
plug straight into tha Altair, end refresh from
Altair memory module*— which may double a* reg¬
ular imory , if you don't mind garbage on tha
It will have 24 lines of upper-case charac¬
ters, SxS dots to the character, 80 characters
to tha line on a built-in monitor. In addition
it will offar graphic! from bit maps (see p. z>,
aither 120x120 or 240x240. (Tha resolution will
be evi tch-selectable, if you hava enough buffer
memory; a screen of text takes 2K, so doea a
120x120 picture, and 240x240 takes a whole 4K.)
Buffer moery will aleo be dividable into sepa¬
rate "pages* of taxt or graphics; and two pagas
will be superimposable. interlacing alternate
video field* (see pp. DM6-7). Hot* that refraah-
aent ia from random-access, rather than serial,
memory, ao that multiple field* cannot be overlaid-
ette*
While none ha* beer, announced aa yet, a music
aynthaaizer that plugs into the Altair will almost
certainly be available in 1976.
(Note that this could provide an entirely new
form of interactive terminal if used With the
Wachaprea* equipment; see nearby.)
A Salectric interface to the Altair la in the
work* at HITS.
Altair interfaces to tha PDP-0, PDP-11 and
Hov* have not yat appeared. Why not?
dec’s own floppy disk, for the B and 11,
finally came out. Price for 11i 53000 for on*
drive. 54000 for double.
L Die tape, idiich is virtually the same as
DECtap* but unpatented, has just come out at
52000 for one drive, including controller and
interface to li or Hova (interrupt-driven>.
Hot* that tha unit is compact and rugged, and may
be more suitable than disk or cassette for those
of us concerned about portable rigs and van-
mounting. Computer Operations, Inc., 10774
Tucker St., Beltsville MD 20705. (The bad news:
software costa $300 for the driver, plus 5750
to DEC if you want operating ayatmt FT-11.)
Cambridge Memories, Inc., cleverly sells
main memory banka for the 11 which can attach to
to two PDP-lla at once— thus connecting the
two machine* without using DEC’a expensive
Unibui coupltr.
Also for list Formation, Inc., sells a
curious prcgramar'i consols that traps and dis¬
play* the last sixteen Unibus addresses refer¬
enced; and Pabri-T*k offer* a cache memory for
the PDP-11/45.
■ ^
3B0C. * laser printer, the
38JO, which print# at 13,360 line* per ainu
of printing machine., it’.
‘ ' ^sslcslly *n electrostatic drum copi.
original Xerox 914, on which the patent
o«. (Even Toahibefax now «. k „
*«yw*y. this spectacular beset write*
* acenning laser on the electro.tatic dn»
IBM ha* cleverly found the way around the c
a wiil^* ° f th * dr * ,Urf * c,: instead of
polished metal eurface, if# a renewable
r*o!!irJ! h i Ch 11 U “ lf ch "*9*d automatical!
required for new la<;,..
Moreover, you can have up to IB type t
OH A l8 * 24 d ° t “trices. (THESE APE
« w, ° 011 70 rou * “ cun
A fi*^^' 1 *** u *sr-d*. ignsbl
the drt.. ‘ Pr ° 3 * Ct ° r *"* * H,t to*
7 ^ n«vst oric« ia si
££ Also it **,.
U
i ^ Q.
|£::
tUjlLV ^W|OUC- HCkJy
On* of the buy* of coaputer hletory ia wait¬
ing up at American Used Computer, in Boston,
617/261-1100.
Memo rax, for km unfathomable reason, built
in the early 70a a computer intended to be upwsrd-
oo^>*tibia from the 360/20. But It VII not a 360.
Why did they do thle? The kind of people who
• hop around would not buy 360/20*, and the kind of
people wfws buy 360/20# would ecarcely leave IBM’e
skirts at Upgrade time.
Thu* the Hemorax 40 has, quite understandably,
bean discontinued. And ell the one* they had left
•re waiting for you brand new up at American Uaed
Computer for y>* haart-atopping price of
£ 5500 .
That price includes 48k byte* of core.
Now for the bed news.
It come* bere-bonaa, with no software, and no
hardware support. Vou get the wiring diagram with
it, and a list of other owners, end you're on your
own. AUC does have spare parts, however. And
peripherals, mostly more expensive.
Mr. Monoeon of AUC told me on the phone that
it had 158 instruction*, including 64-bit floating
point, 32-bit binary. On studying tha literature,
however, it appears to me that tha instruction-sat
h* described ia microprograimied, with the micro¬
code intended to be reed in at startup time.
(There are 65 microinstructions.) Maybe you can
gat tha microcode for those 158 instructions and
maybe you can't. Maybe you don't care, if you're
well enough fixed to handle one of these.
It come* in basic black, 2x5x4 feat, fits In
a van, and supposedly dose not need eirconditlon-
ing. Supposedly plug-compatible with 370 peri¬
pherals: It’s really a sixtean-blt machine, and
it has sight seta of eight registers, having been
designed to perform up to eight functions simul¬
taneously.
So. 64 asin registers, 4K dynamic microstore,
48K of memory, for about the price of a used PDP-
11/10 with 4 k. smelling salts, anyone?
"Diabolo" was a game of the twenties that in¬
volved poking a spinning object. Oddly, that's
what today's Diablo involves.
Redoubtable Hex Palevsky, who brought you
Scientific Data Syatwis (which Xerox bought and
recently shut down), Rolling Stone and the movie
“Kerjoe"— has another winner, which he'e also
sold to xerox.
This is the Diablo company, which first
mads disks and now makes a sensational printing
machine. It has a whirling plastic "daisy
wheel* of type, interchangeable, and can type
30 characters per second in either direction, as
as well as draw pictures— of a sort.
The basic difference between these prin¬
ter* and conventional typewriters, like the Sel-
ectric, is their use of servos rathsr than rat¬
chets. This means thair characters can be posi¬
tioned in many intermediate positions, unlike
the fixed positions available on an ordinary
typewriter. For instance, the Diablo can posi¬
tion the type to 1/60 of an inch horizontally
and 1/48 of an inch vertically. (Nice for justi¬
fied typesetting.)
There are new a number of machines of this
kind. First came the Diablo printer, officially
the HyType 1; then the engineers who built that
went off and created a ccmpetitiva printer called
the QUME (pron. 1 kyoom'); now there'* an Improved
Diablo HyType II; Interdata makes a competitive
unit, the Carousel printer, with a little print
cup; and to sake things totally confused, there's
a special model Diablo called the 800, which
can't be connected to computers but is sold for
office use as a "word processor."
A number of companies make terminals in the
55000 ball-park embracing one or the other of
these printers. Gen-Coin Systems makes one around
the Dieblo; Anderson-Jacobson makes one around
the CUKE. Xerox makes its own computer terminal,
the 3010, around the Diablo I— which, it should
be noted, can be rented for as little aa three
months, at 5190/oonth.
Tha one everybody wants for their computers
is called the Xerox BOO, but so far that is not
available as a computer terminal. It goes faster
than the other Diablo* and offers typefaces that
look beautiful for typesetting; muefv nicer, it
seems, than the types currently available for the
other Diablos.
For those interested in just hooking up the
printer mechanism, for substantially less money
than a whole terminal, interfaces for hooking
the Diablo or QUME printers to PDP-8 or PDP-11
are available from Data Systems Design, Inc.,
1122 University Avenue, Berkeley CA 94702.
SUGGESTIONS TO XEROX CONCERNING DIABLO PRINTERS.
No charge.
1. Sell the 800 at a terminal, for goodness sake.
2. Failing that, make those pretty typefaces
available for the others.
3. Already you offer black and red ribbons; a
blue and yellow ribbon would permit printing
PICTURES IN FULL COLOR, a development of _
great interest to the many computer graphics
freaks.
4. However, that uould require someuha t finer
positioning of the platen; say, 1/120 in both
directions.
6. ... failing which, you could put out a "graphic
daisy uheel” with intermediate dot positions
equivalent to dot positions between those
nou available.
6. Could the Diablo somehow be made to sound less
like a dentist's drill?
7. Hou about a portable?
iPGOMtlCY
Dsn Hillis and Radis Perlman of tha LOGO
group at MIT, era working on a epecial "preliter-
ate* terminal to allow non-reader* (possibly in¬
cluding chimps and gorillas) to program in LOGO,
especially on tha General Turtle 2500 (Bee "Min¬
sky-* Computer,“ nearby). Plastic credit card*
will hava symbols Tor the various picture and
mualc-box functions. To write a program, or
create e movie on the scope, the user will inaert
function cards in slots. Color coding will be
used for program tranafan a red card maans "jump
to the rad subroutine." Since this ia MIT, tha
full recursive power of the system will of course
be available. (My hope is that chbapanzaea and
°ther little mlotnika can be taught recursive
program definition. Then will the public wake up
to computer* being easy?)
M'NSCC frMP 01 £*
»Wo a/fcrpoHift/. Irheucer
MARVIN CWoTer^,
The great Harvin A (insky is renowned on five
continents. Dean of the amorphous field of “ar¬
tificial intelligence,“ and referred to without
ambiguity as “Marvin" throughout oosqntterland,
he is a theoretician's theoretician.
But at the heart of every theoretician, I
think, burne the dr eon that he will someday prove
the outright, worldly importance of hie thoughts.
Like Destry, at last he will go to hie suitcase
and get out hie guns, and the audience will cheer.
The great Harvin Minsky has oome out
hlaeting.
General Turtle, Incorporated, is a toy
company that the team of Minsky and Papert put
together to market their educational computer
accessories. (See p. 57.)
They’ve sold a few, but tha impact has been
modest. And, aa a m em b er of the project puts it,
"We wented to get our ideal for education out to
the world.”
So they decided to build a terminal. But
it grew, as terminal designs will. It is now
tha GTI 2500.
Remember the tortoise and the her*? Thi*
ia the hairiest tortoise on four Wheel*. Plrst
deliveries this fall.
And here's what you get for your five thou¬
sand dollar*--
thc ruten —
a 16-bit computer like none you ever saw.
8 working registers, in addition to PC.
32 scratchpad registers (70 nanosecond).
250-nanosecond 1/0.
4K of main memory, 250 nanosecond. (Expand¬
able, of course.)
IK OF MICROPROGRAM HOWRY, 40 NANOSECOND,
DYNAMICALLY ALTERABLE. (Expandable to
4K.) Likewise 16 bits.
Nov
Cassette mtaory, 1 drive.
Alphabetical display, standard video, with
8x16-dot character generator, 64 char¬
acters, DYNAMICALLY ALTERABLE. Also
expandable.
Vectoring graphic display with 2D rotation
("turtle geometry"— lines are speci¬
fied not by endpointe but by angles and
length). 512x512 resolution, 1 million
•ndpolnts/sec refresh.
Keyboard.
I asked Dan Hillis, e member of the group, about
tha possibility of installing the 2500 in a van.
“Think of it aa a recreational vehicle with the
van optional," he said.
iN^eow;
What makes possible the computer counter¬
culture and everything else ia, of course, the
spectacular development of electronic chip tech¬
nology, the techniques of shrinking great elec¬
tronic circuits to almost no size. Electronic
rigs that were shoebox-size ten years ago are
typically now etched on chips the size of your
thumbnail and sold for a few dollars, no matter
what they contain.
A few years ago, the chips only contained
building blocks, such aa registers— units for
holding information temporarily. But now in
the mid-seventies they have come to contain
whole computers, or large sections of them.
(The distinction between microprocessors and
computers is taken up on p. 44.)
The first biggies were from Intel: the 8008
end then the 8080, a chip that has become the
heart of the Altair (see p. X), as well as rival
computer*.
New computer chips keep coning out; people
keep telling me to mention specific onee, but I
can't keep track of them. The Motorola 6800
seems popular; it will soon be the heart of new
computer* from HITS and SPHERE (see p.W and Y).
(An augmented and faster copy of the 6800 is re¬
putedly being sold by MOS Technology for $20.)
Another interesting computer chip is the PACE
microprocessor from National Semiconductor, with
four working registers and a ten-word stacki
with 16K memory it costs $500. (The PACE is
hidden in an automatic drink mixer and booze
inventory controller from Electro Unite Corp.,
San Joes, Calif. Adjusts prices to hours and
can even water the drinks precisely. Claimed
to make absentee ownership of bar* practical.)
Because of Chips, the price of computer main
memory is collapsing apace. Something like a
dollar a word in the sixties, it is something like
like a dime a word now. But Intel now offers s
storage chip holding 16K bits for $55, which is
34 a bit, and a friend of mine estimate* that
memory chips will cost 1/10 of a cent per word in
1976.
These coat collapses cause many to predict
the end of disk and tape. But that's preauture.
While these sappier chips hold e lot for a little,
their contents disappear whan the light* go out.
Until laser-punched tape comes along, disk and
magnetic tape will be very much with us n long¬
term and neckup storage devices.
Because of the acticn in chip technology,
a potential important movement in computer design
may hava bean passed over: the "macrae»dulee" de¬
veloped at Washington University in Et. Louis by
Wes Clark (father of the original DEC module*}.
The basic idea of tha macroaxxdula approach
was to have computer subsection* that were com¬
pletely interpluggable. With them you can build
any computer, to your own design, in a couple of
days. The system exists now and it works Just
fine; counters, registers, memories can ba at¬
tached quickly by cable.
Unfortunately, the coat Is high and thay
haven't found a manufacturer. With chip priees
falling, and chip know-how widespread, it's hard
to justify charging tan or ao times as much for
componsnt* just bacauaa thay can ba plugged to¬
gether faster. (Juet as unfortunately, every¬
thing in the macromodule system ie built on sec¬
tions of twelve bite .) For this reason the St.
Louis folk are having trouble getting crxnercial
sponsorship. However, perhaps Soma bright hun¬
gry chip company, reading this, would like to
get into the macromodule game. And presumably
whittle the module down to the now-univerael 8
EQUIPMENT
PAGE
M) G^fon^
The most glamorous computer, being built
today all sew to be openly celled by their devel¬
oper.- name.: the Cre.nbl.tt cwputer, Mln^y'e
computer, the Amdahl machine, the Cr.y computer.
me AMJAHL C? mpore^
The Amdahl computer or Syetem 470, a euper-
computer of the 360 eerie, by on. of the guy^who
designed thw originally— m* p. 41 _*_ riow
sv.ilebl. from Amdahl Corporation, 1250 Bait
Arqua* Avenue, Sunnyvale CA 94086. (They axe now
advertising for system, people who know tha in-
sida. of 05/NVT, VS. etc.). The first 470 i. up
•ni running st NASA's In.tltute for Space studi.e
Coliesbi* U. But IBM la said to ba readying on*
of thair famous “knockout* machines to do it in
( Datamation , July 75, 96.)
otrofiTO}
Of course you’ve thought that hardwired
setups were for eloppy analog type* of thing.
But here new we have THE CHESS MACHINE, under
•traightfaced construction at tha MIT A1 Lab,
which will provide HARDWIRED THREAT ANALYSIS.
Yes, its advanced perception architecture will
supposedly be capable of analyzing threats to
any given position Ln a GRAND PARALLEL FLASH.
Th* impact of thi# astonishing davelopaient on
the world of Electronic Chess, or anything else,
for that matter, is totally impossible to
predict.
Over a very nice lunch
at Foditys in Chicago,
Prof. Minsky and I dis¬
cussed possible styling
for his computer. Be
particularly liked the
arrangment suggested
in this sketch; a fold¬
down keyboard and the
displays sort of on poles
so they could be seen
easily through a crowd
of bystanders. The han¬
dle would only work, of
course, with the scopes
removed. We'll see later
what it finally looks
like.
W GtfEM$U(TTMA<W
Unsatisfied with the structure of normal
computer*, they are building at MIT's AI Lab e
computer whose native language la LISP. It will
have 32 bits with virtual memory, and execute
LISP like a bat out of hell.
In a refreshing reversal of trends, it will
be for one user at e time. "Time-sharing is an
idea whose time has gone," chuckles one parti¬
cipant. (Project MAC, where time-shoring grew
up, waa there.)
The cw cwotm.
Seymour Cray, master computer builder, crea¬
ted the 6600 system for Control Data. Indeed, he
had the audacity to require CDC to build the com¬
puter factory on the property adjoining his own
estate ln Chippewa Fails, Minnesota. Now that
ha’s broken off to start hi* own company (with
money from CDC, among othera), tha new computer
factory adjoins hia estate on the other side. The
Cray-1, another supercomputer, is nearing comple¬
tion there.
WJ>1 0 -TKMfctPUMtefc
Patent 13,875,932 ha* now bean issued for
How Wachspress’ electronic sex machine or what¬
ever it is (you saw it first on p. DM9). ln th*
Illustration we see it tickling • shmoo.
After you send Wachaprea* his fifty-buck
royalty, you can either buy the kit or a pre¬
built model. Concave or convex, as the poet
says. (Etchings are antediluvian and waterbedt
are cooaaonplacei as an invitation, what more in¬
cisive comeuppance could be proffered?)
Speaking of Machapraaa, it seams thee the
unusual I/O equivalent offered by the Federal
Screw Works (Troy, Mich.) la only * voice output
device.
Surprisingly, a voice input device is now
cxxnercially available from Threshold Technology,
Inc., Cinnaminmon, NJ. For $10,500 you get a
device that will recognise 32 spoken wrde, end
microphone*. (Each user has to train it on hla
32 words, but separate vocabularies may be
stored on the computer for different users or
purposes. This ia still some wey from tha
fabled "talking computer"-- saa pp. DM 13-14 for
problem* and objections— but it'* undeniably a
useful step.)
- z
f
The halftone lyitie of HUMRRO, rumored on
p. DN38, i» reel. Clever indeed; it divide* the
half-tone problem into two parte, on* the orig¬
inal picturing of the scene, the other it* pres¬
entation in the terminal. That mean* that their
systms permits one central image generator to
send out pictures to as many terminals as de¬
sired. Unlike the Watkins Box (see p. DH37),
whose half-million-dollar opulence can be poured
only on a single user at once, in this system
the central resource can be distributed among
various users, with each one'a picture changed
intermittently, or poured on a single user for
full animation. Currently it runs in Fortran,
transmitting encoded pictures to the unusual ter¬
minals required (built around Trinitrons). But
a special central processor is foreseen.
The systm* is called CHARGE, and Ron swallow,
it* developer, la Indeed a hard charger. (Soft¬
ware: Bill Underhill and Roger Gunwaldeen.)
Swallow's game isn't movies or engineering gra¬
phics: he want* CHARGE to compete head-to-head
with PLATO (see pp. DH26-7). And at the price*
he's talking about— $5000 per terminal and
$150,000 for the central procrv:r.or-- who knows?
Millions of psopla saw computer graphics for
the first time on the PBS "Ascent of Man" series,
where a screen drawing of Early Men's skull was
seen to rotate and gradually change In It* fea¬
ture*. This was startling even if you know about
computar graphics, since it seemed to be proceed¬
ing from complex data concerning the entire
skulls and their change*.
Not so. Actually what you saw was a aeries
of skull drawings by Peter Foldas, a Parisian
artist, with the computer generating transitional
drawings batwean then . (Indeed, though you saw
Prof. Bronowski next to the screen, you did not
see him next to the screen *t the same time the
drawing* were changing— because that had to be
filmed very slowly.)
The lyiten was created by Nestor Burtnyk and
Marcelli Wein, of the National Research Council
of Canada. It currently runs only on an SEL 840A.
(It was also used by the National Film Board of
Canada for creating Foldas' splandid film "Hun¬
ger,") They can previev by rolling through bit¬
map video on a moving-head diek. (See Burtnyk
and Wein, "Computer Generated Key-Frame Anima¬
tion," J. smpte, March 71, 149-53.)
What about the animated figure that talks to
Joe Garlagiola before baseball games? Haha.
That's a rubber puppet matted in from a black box:
the guy who does the voice worke the mouth.
Many unlikely individuate have stormed that
heartbreak town of Hollywood, leaving sadder but
wiser — but loan Sutherland, dean of computer
graphiae7 Veil, having found that the movie-
mkers are not ready for image synthesis — the
dreamemithe unprepared, as it were, for the Total
Forge — he is sojourning at the Hand Corporation.
A fella named Charles McCarthy, of suburban
Chicago, bought the "Computer Eye" from Spatial
Data Systems, and will do mail-order picture con¬
versions. He'll convert your favorite snapshot
to a printout of the same subject made of light
and dark letters. If you're interested in having
the actual grey-scale data for processing in your
own computer, inquire.
The riobius Group, Inc., P-0- Box 306, Win¬
field IL 60190.
Want a computer-controlled videocassette
recorder? The model to ask for is the Sony 2850,
coating (gasp) some six thousand bucks. An in¬
terface to the PDP-11 is made by CMX Systems,
635 Vaqueros, Ave., Sunnyvale CA 94086.
Incidentally, scaled-down CMX editing setups
are beginning to get around. For instance, they
have a small setup in the pleasant offices of DJFi
Film L Tape, 4 East 46, NYC: three of the above
Sonys and the QiX Model 50 control setup, using
a PDP-11 and keyacope. Though prices are by the
job, the basic charge is $75/hour. (Note that
the big. CMX setup, with a disk, is the model 300.)
TiK«l,WN,W«l
Since the forties, there have been continual
announcements that video disks— movies you play
on your TV off a record— were right around the
corner. Earlier this year they were supposedly
going to be available before Christman. Now they
might be on sale, "on a limited basis," in 1976.
(TV Guide, 16 Aug 75, p. 7.) Because of the grave
difficulties of engineering— inaccuracies in pun¬
ching the center hole mean the track can't help
being off center, for instance— sane of us are
skeptical.
Two systems have been confidently announced.
Philips, the firm that gave us the audio caasette,
has a system that will follow the spiral track on
the disk from underneath with a laser. The disk
turns at 30 revolutions per second, or one turn
per TV frame, so it can supposedly freeze on one
frame when desired.
The other system Is from RCA, which has
a long history of me-too announcements, but at
least two of them made it big (the 45 record and
the color TV system now used in the USA), so RCA
should not be dismissed out of hand. Their disk
system will supposedly go at 450 rpm (7.5 revol¬
utions/second) , but they still mean to track it
with a needle . The man from TV Guide says he's
seen it and it works perfectly, but I -would per¬
sonally look for hidden wires.
(MCA, an entertainment conglomerate, has
hitched up with Philips and printed a catalog of
all the movies they will supposedly make available
on disk for the "NCA-Philips" system— such as
D *»try Rifles Again for around ten bucks. Thia is
probably just a bluff: with the price of audio
records what they are, no way is a movie going to
cost ten bucks. But it makes RCA look weaker,
which is probably the purpose.)
The prospect surprised them, but MAGI (see
p. DM36) allows as how they might let you make
movies on their over-the-phone movie-making setup
(sketched on p. DM36). Price to capable out-
ders, if the software meshed, would be about $50
an hour, (six hours makes one minute of film,
not counting the phone bill. Cheap if you know
movie economics.)
Meanwhile, John Lowry, at Digital Video Lab¬
oratories in Toronto, has been developing high-
quality video suitable for transfer to theatrical
film. He and they have developed a 655-line
color system— with heavy digital enhanemnent
(see "Picture Processing," p. DM10). I scarcely
believe my notea, but 1 saw it, and wrote down
that it was comparable to 35» studio color.
The day of "electronic cameras"— that ia, film-
quality video— may be upon us soon.
About 1972, there was announced an electron¬
ically-controlled color filter that could change
to any hue in nanoseconds. That would be just
what we all need for color movies from CCMa—
but what happened to it?
feTOl^SftVtf
At the high end of things, a firm called
Three Rivers Company has come in with a 3D vec¬
toring system (competitors discussed p. DM30).
Supposedly they can pack a lot more lines on the
screen.
The price of the GT40 display (see p. DM21),
which all in all is one of the best displays on
the market, has just dropped to 56500. To dis¬
guise this pride drop, DEC gives you the smaller
tube and no keyboard.
And at the low end, a firm called Megatek
in San Diego offers line-drawing CRT controllers
for $1000 to $3000. All permit animation. You
have to supply the oscilloscope. Their equipment
plugs into the PDP-11 or the Nova, or in one
case connects in tandem to an ASCII time-sharing
terminal (!).
The 11 and Nova models work directly from
BASIC; your program in Basic puts line lists in
the device's buffer memory. The time-sharing
model converts incoming line lists from ASCII to
binary and stores them internally. 256 linea
with 8-bit resolution cost $1900, $110®and $1600
for 11, Nova and t-s respectively; 1024 lines
with 10-bit resolution cost $2800, $2000 and
$2500 respectively. (Nova and 11 models can be
completely updated in two refresh cycles, yiel¬
ding as much animation as anyone can decently
expect for the price. Software is supplied to
provide display output from Nova, PDP-11 or time¬
sharing BASIC; also t-s Fortran.)
Meanwhile, for the hands-on electronics guy,
Optical Electronics, Inc. makes all kinds of ro¬
tation modules. You can build your own 3D rota¬
tion setup out of their modules for a couple of
thousand: but, of course, the fancy digital I/O
for high-speed refreshment is not available.
An interesting capability of the OEI equipment,
though, is that you can build 4D - or even 5D-
rotatlon systems out of their modules. Hmmm.
?lAcro Kvaf
Excellent manuals on the PLATO aystan and
TUTOR language are now available from CERL, Uni¬
versity of Illinois, Urbans.
The next generation of PLATO terminals is
coming down the line. The microfiche projector
ia withering eway, as was eaaily foreseeable;
meantime, steps are being taken toward a more
high-performance terminal, by putting a computer
in it. Thie is being done both by Jack Stifle,
who has done it with the Intel chip, and Roger
Johnaon, who haa the panel interfaced to an 11.
(11 fans please note the implication: it is pos¬
sible that the interface may b* marketed.)
Meanwhile, PLATO-like terminals (the model
AC-60) are about $5000 from Applications Group,
Inc., P.0. Box 444B, Maumee, Ohio 43537. Note
that these hava standard non-PLATO interfaces
and standard keyboards, but the Owens-Illinois
plasma panal (erroneously called Corning else¬
where in the book) blazes in all its glory.
flTWWS
T1i» main development in coagxiter graphics In
the last year has been the sudden upsurge of the
bit-map approach to computer display. While the
approach, and equipment for It— like the Data
Disk system-- have been eround for seme time, the
falling pries of electronics, especially In the
memory area, have made It abruptly the cheapest
and thus tha most popular type of coaputsr dis¬
play for graphics.
A 'bit map" is a aerie* of dot positions,
or bits, recorded in seme form of feet memory
and read out in sync to a conventional scanned
video eystm (see pp. DM6-7) . The one bits
stand for dot* or little equares, the zeroea
for nothing, and the video system brightens the
corresponding zones on the screen. This method
hae certain disadvantage*-- parts of pictures
cannot be automatically dietinguiahed or sepa¬
rately animated, aa with aubroutining display
(see "The Mind’s Eye," asp. p. DM23)— but for
the money it'* great. Sizes given refer to the
number of squares in the rectangle of the picture.
BLACK-AND-WHITE
An off-the-shelf bit-map systM for the
PDP-11 or the Nova is available from intermedia
Systems, 20430 Town Center Lane, Cupertino CA
95014 ($2750 or $2500 respectively). May be
ganged for grey-scale or color. It's 256x256.
For the Altair, the forthcoming 8096 display
(see p. Y) Will have 120x120 or 240x240 bit-map
graphics, for prices starting around $1000.
COLOR
Extra bit maps, plus electronics, can get you
color; if you double the number of bits you can
double the nvnber of available colors on your dis¬
play, ad lnfinitra.
On the small side, 64x64 color wll shortly
be available for the Altair from the Digital Group,
Denver. A 128x128 color bit-map system for the 11
has just been announced by DEC (for "nuclear medi¬
cine" of all things— but they will part with it
to anybody for 8 or 10 thousand (not yet fixed)),
they stress that this will be the first of a modu¬
lar series of bit-map displays, with plugins for
different degrees of resolution and differant
character generators.
Romtek and Comtal both make 256x256 bit-map
systaas, priced in the $16,000 area.
Above this resolution special TV systems tend
to be necessary. Both Ramtek and comtal make very
expensive systems for the purpose, using
solid-state and disk respectively.
You may or may not have heard of the Advent
TV projector, the most glorious TV thing there is.
It costs $3500 and projects a four-foot picture in
the best TV color you can find. A lot of guys are
bit-mapping to it.
At MIT they've got bit-map color on the Ad¬
vent at better than 400x500 resolution. (An option
planned for the Flying Turtle (Bee p. Y> will al¬
low its core manory to be used with the Advent as
a bit-map display refresher.) At Comtal they're
going for 1000x1000 on the Advent, rejiggering the
electronics from scratch.
The most spectacular demonstration of bit-map
color so far has no doubt been the film done by
Dick Shoup et al. at Xerox PARC (see p. X), show¬
ing the super animation that's possible when big-
computer resources are given over to bit-map ani¬
mation. Their system is 600x800.
Y<VK. $«Cr Aisrw pwtij
All those scoreboards and wisecracking light-
grids, now that they are computer-controlled,
raise all kindB of possibilities for non-frame
animation. The big ones cost in the millions; a
small one for shopping centers costs a hundred
grand (Millenium Info Systems, Santa Clara CA).
Within a year or so, though, you ought to
be able to get a nice animated display-panel of
some sort for the side of your van, assisting
you've got the computer inside.
A surprise something-or-other from DEC, the
VT55, represents a breakthrough of some sort. But
what were they thinking of?
"Graphic capability" has been added to an
ordinary upper-case keyscope. Specifically, the
ability to make two graphs , i.e., two wlggly lines
(no more) somewhere between the left and right
sides of the screen. You can also shade in under
them, and add coordinate grids. It's $2500, and
obviously great if you're bonkers for 2D graphs.
QJW QH0!$ &M4C-T&
IBM, which did not taka port in its develop¬
ment, is sponsoring a $100,000 CHARGE installation
at the University of Waterloo, in Canada.
*rv « rwfiwf*
labor Day, 1975
WORK THANK$
In banging together thia
volisae originally. I omitted
thanking Hash Wlaner, brazen t
brash young old-fashioned new
editor of Computer Decisions ,
who has changed that publica¬
tion from stolid to peppery.
Thanks also to my good
friend Robert w. Fiddler, Esq.,
patent attorney and still an
ax-phllosophy professor at
heart, for many delightful and
witty conversations on problem*
of patent, copyright and the
vagaries of intellectual prop¬
erty. Any harebrained ideas on
these topics expressed here,
however, ere almost assuredly
■y own.
For much of the informa¬
tion in this supplement 1 am
grateful to Bob Albraeht of
PCC, mentioned here and there.
Finally, special thank*
to CcMsander Hugo McCauley,
better known to you as Hugo - *
Book Service, for hi* yeoman
performance in shipping out
the books— not to mention car¬
rying then up end down stairs,
typing the mailing labels,
checking for bad onas, and
sending out all thooa notes of
apology when we were out of
books again and again and again.
And to long-suffering Lois and
Megan McCauley, my especial
gratitude.
WHATEVER
The sea-to-shining-sea
Nelson Unplre now consists of
a lot of unsold books, a IK Al¬
tair and a second pair of shoes.
My scheme for taking on Appren¬
tice Generalists may have to
wait awhile. So may Computer
Lib, the film. But just wait.
Speaking of which, what
about this book, hey, now?
Eventually there will be
a new edition. Yes, the type
is horrendously small, and that
will have to be fixed. But
that involves new negatives for
every page, an expenditure of
thousands of dollars, and some
reconsideration of how this
should all be sat up.
There have been several
interesting plans. One was to
split the contents of this book
into three books, add material,
enlarge the type and have them
each this size and price. Ten¬
tative titles were Computer Lib
/ Dream Machines , Computer a
Arise (/ Computers Arouse!, and
Guerrilla Ccmputlnq/Blectronlc
Monkeyshinas . Sample cover,
for Guerrilla Computing : King
Kong climbing the front panel
of a 370 holding Patty Haarst.
(I also daydreamed about put¬
ting out a lO-volvsne encyclo¬
pedia in the same format, em¬
bracing psychology/sociology,
biology/evolutionary strategy,
history (as strategy)/more his¬
tory (as mood and feeling),
revolution versus continuity
(a two-sided position paper),.,
the Gem-Maniacal Encyclopedia 6 ™.
But reason has prevailed, and
such forays have been postponed
indefinitely.
The present plan is for
Computer Lib to be rewritten
and reset in bigger type, at
least 256 pages, with at least
8 color pages and color cover.
(We're talking about fall '76
or later.) Price will have to
be $15. If you think that'a a
ripoff you can still get this
one. (A number of people have
complained to me about the £7
price tag of this volume. Have
they ever bought other books?)
Later I would like to put out
an anthology of my favorite ar¬
ticles in the field, using the
Computers Arise (/ Computers
Arouse! title and format, and
with some good 3D if possible.
In any case, I want to stay in
the publishing game: I haven't
had so much fun in years, oth¬
er projected volumes include
The Inner Beyond , by Sheila
McKenzie: Dirty Driving and the
Strategy of Traffic by "Driver
Ed;" and The Nelson Computer
Glossary . Soon 1 hope to be
able to typeset from my own
computer, and possibly to share
this facility.
This has been a moat in¬
teresting year. I have been
pleased to meet, and otherwise
enjoy, the variety of clever,
charming and/or lubricous per¬
sons who have sought me out
since the book first appeared;
as well as all the speaking en¬
gagements, soirees and whatnot.
I am delighted to receive
relevant material and communi¬
cations of any kind, although
problems of time, disorganiza¬
tion and mood often preclude
a Personal Type Haply.
It has bean a real lift for
my morale to share some of these
ideas and enthusiasms with a
wider public at last. It is
you, finally, who hava to care:
and I am very glad you do.
As to the most important
matters, there is • news black¬
out for tha indafinite future.
Plaaaa stand by.
Next year in Xanadu.
WZI
Thle book (both .Id..) 1. b...d lo port on -r ■ • «
American Ch.r.tc.1 Society. th. Aa.rle.n Dec gsen te11 on In.
An.rlcon Managesent A.aoci.tton, th. Aa.ocl.tcd Pr«.., th
ton for Cosputing Machinery, th. C.ntr.l Intelligence A».i
ltut. of El.ctrlc.I .nd Electronic. Engineer. the Prtn
l.hIn. A.aocl.tlon, th. Rend Corporation, th. Society f
on Dl.play, th. Society of Motion Picture .nd Televietoi
Incorporated, Onion Th«olo«lc.l Sesinsry (th. Auburn 1
. Palo Alto It. ..arch C.nt.r, and varlou. art .choola, c
erattle* .nd Joint Cooput.r Conference..
Infor-
Engine*
turn.) ,
leg**>
ACKNOWLEDGMENTS
Everybody At Chicsgo Circle Campus
has been very sporting about this project.
I an grateful not only for the oncourage-
»ent and assistance of various individuals
(especially Joseph I. Lipson, David C.
Miller and Samuel Schrage), but for the
atmosphere of support which has made this
possible. My thanks to the Department of
Art and the Office of Instructional Re¬
sources Development for freeing me from
teaching duties, to the Computer Center
■nd the Department of Chemistry for let¬
ting me use pictures of their equipment,
and everybody for their encouragement.
I would like to thank the Walt Disney
organization for their permission to de¬
pict their wonderful characters, and ev¬
eryone else who furnished materials and
permissions for the things herein.
Thanks also to those who looked over
some of the material, especially Herbert
Grosch of Computerworld . Dan McGurk of
the Computer Indus try"Association, and
William Rodgers.
I am particularly grateful to the
many who have explained computers to me
over the years, especially Dave Denniston,
Robert Fenichel, Andrew J. Singer, John
R. Levine.
My thanks to Tom Barnard for some of
the early typing, and for the Porta-Xan.
I am grateful to Computer Decisions
magazine for their good will, and help in
researching computer image synthesis.
My roommate Tom DeFanti, mentioned
elsewhere in this book, has been consid¬
erate beyond the call of duty in giving
over all the first-floor rooms of our
house to this project for six months.
wc MMtews-ric?
Persona of sagacity hove been saying for
some time that we are materialistic.
In an Important sense this ta not so.
Th# machines, and toy., and Involvement#
w. buy into, are in but a smalt proportion of
casea owned .imply as scores, for their coat
as consumption symbols.
Rather, we buy things that REPRESENT
IDEALS, hoping ourselves to partake of some
abstraction or image-- the Playboy man, the
Smart Businessman, the CJcvcr Homemaker.
Each product tries to tell us it is the key¬
stone of a way of life, and then, at least at that
moment of purchase, we step into, wc embrace
that Way of life, covering ouraclvcs with the
feeling, the aura, the magic we saw in the com¬
mercial.
This ia not material lam. It la wishful
gTasplng at miasma. (Following sentence op¬
tional.) It is communion, with the object seized
simply the Objective Correlative of a hoped-for
transaubstantiation. (Sorry.) It's a seeking,
not to possess * to belong.
My thanks finally to the many others
whose good will has kept me going, in
particular my former wife and eternal
friend, Deborah Stone Nelson.
Special greetings to ny friend and
neighbor, Mrs. John R. Neill: I hope you
enjoy the uses which your husband's il¬
lustrations of Tik-Tok the Machine Man
have found here.
Lastly, for her contributions to
morale (and for not footprinting the
pasteups), let's have a warn hand for
Pooky the Wonder Dog.
The occasional Oz illustrations are ail by
John R. Neill, from varioua out-of-copyright Oz
books by L. Frank Baum, especially Ozma of Oz
and Tik-Tok of Oz. Tik-Tok. the Machine Man.
is the figure to whom occasional allegorical sig¬
nificance is attached here by juxtaposition.
The Oz picture in this sDread is from
The Patchwork Girl of Oz ■
Thought you might wonder.
D.W. GRIFFITH-- took the movie-box and created
the photoplay . no longer a twisted stage
production.
WALT DISNEY-- created a hypnotic pantheon of
kindly and innocent semi-animals, senti¬
mentally universal, generally acceptable.
JOHN W. CAMPBELL-- as author and then editor
of Astounding , turned American science-
fiction from the Buck Rogers space opera
to the human story . built around thought-
out premises and structures.
IVAN SUTHERLAND-- programmed and systematized
a computer setup for helping people think
and work with deeply-structured pictorial
information. (Sec p.jthtl).)
DOUG ENGELBART-- foresaw the use of computer
screens as a way of expanding the mind,
and over the last decade and a half has
brought about just that.
And more, and on.
- A // V
ANOTHER QUICKIE
Compare Alice, when she gets to Wonderland
("Deary me! Curioser and eurloser!")
with Dorothy Gale, tranaporled to Oz
(" How do l get back to Kansas ?!! t")
Fantasy ties in with everything, including
American gjt-out-n-do-il.
OUT THE DOOR IN '74
I ha'
, t * d “rite an introduction to eonputars, and a separate book on Fantica, for years.
““f 1 ” 8 th *“ back-to-back in a Whole Earth foraat, with lota of alachlevoue Enrich-
-ent material didn't hit .e till Jan 73. I have tried to add all the stimulating and exhilarating
stuff I could find, especially personalizations, as on the other aide; coaputers are deeply personal
mac inea, contrary to legend, and ao are ahowing-ayatemu. 1 regret having to throw so many of ay
but I hope that some readers will sense the seriousness below.
elief ,
The fli
thing i
—j for this book esae fr
straightforwardly how to asks Geodesic Doses. A
wonderful Whole Earth Catalog of Stewart Brand. As I think back,
’ Seegar a wonderful banjo book, and Tom HcCahill's autoic_
that of taking my case to the public because the expe:
i Mej. Alexander de Seversky's Victory Through Alt
•oa Pete
Ae to the laet
precedent I cen think'
try how he thought
i World 1
II.
s in Hechenix Illustreted .
'ta won't listen, the only
Power, telling the coun-
Thle project, staple in principl
a.ry because no publisher could have coaprehen
( * d ‘ ) * — Pu bllah -It- Youraelf Hand'
10701.
'"llit present product is not
do rut JD. (Believe It or not,
checking and bibliographies had
type size; and so on. Half the i
tlons on aovies, "au 1t 1-aed ta , " i
future, and goodness knows what.
Infinitely bother
ded the concept of t
ndbook . $4 froa The Pu
lose, Se1f-pub 11ca 1 1 on was neces-
iIs book; 1 heartily recoaaend Bill
ihcert Book Press, Box 845, Yonkers
the book I had ae an t to write. Heat la firat-draft; how the send
I do not like underlining things— a first-draft expedient.) Feel
to be largely abendoned. Batter planning could have increased
manuscript, and the glossary, had to be kicked aside; Including a<
" " rrt fila. training simulators, augmented stags productions of th<
zy for all that.
... WITH A LITTLE HELP FROM MY FRIENDS
-y -lIe 1 InS r wi« t fri«da n sh^. h ‘rv be * n CO,,pUt * d ““bout th, dedicated and axtr.ordin.ry effort, o
my deepest gr^Itude ^her ai!. a th A both Acuity a.eb.r. at ClrclS, who have
project (which I continuous^ under,.ti *?*.»"?**? u * th,ir ,00<t tiM to th * tB<liouB aepects of this
p J 1 , „ “ • ' “ ,d ' 1 hope u hBB worth their work aa « " -
who.e concern for intelligent change in education drove
has also ay deepest adairetion.
Ms. McKenzie,
this project
i boundlei
The sad thing about it all li
ayataa (of which only a couple ex
I feel deeply for everyone who hai
decent systems were available.
that 90X of th... effort, ar. unn.ee..ary. A decent coaputer text
I *“***) would have obviated all tha findlng-and-retyplog probltit,
trouble writing by conventional eeanap and who wouldn’t if only
sn 3
w seer
I already said on the other aide that the
computer is a Rorschach, and you make of it
some wild reflection of what you are yourself.
There is more to it than that.
America ia the land where the machine ia
on intimate part of our fantasy life.
Germans are too literal, they can get off
on well-oiled cogs. The French ere too vague.
(I've noticed that German science-fiction maga¬
zines had covers of machines and planets: French
science-fiction magazines, of dragons and people
with wings. Our science-fiction covers show
people with machines. Intimately, emotionally.)
German fantasy Is icy and impersonal. French
fantasy too personal, and American fantasy is
splat In the middle, uniting both: man and
machine, means and ends, emotion and details.
Men always longed to fly, but it was here
that they first did. This is the land of the
MOVIE, a fantasy fabricated with endless diffi¬
culty using various kinds of equipment.
The mad tinkerer is a fabled character
in our fiction.
This is the land of the kandy kolor hot
rod. the Hell's Angel chopper, the drive-in
movie. And the wild hot-rod. in fact, is Just
the flip side of the deep-carpetcd Cadillac: each
is a fantasy . on extension of its owner's image
of himself in the world.
Thus it was not an historical accident,
but utterly predetermined, that in the hands of
Americana the computer would become a way of
realizing every conceivable wild fantasy that
was dear to them.
This ia perfectly all right. This is as it
should be. This ia the best pert of our culture.
Not "Let a hundred flowers bloom," but "Let a
hundred gizmos clank.” This has sped immeas¬
urably the imaginative development of many dif¬
ferent things we might want. I try here fairly
lo explain a few differences among them.
There is just one problem with all this.
Now that oil these things exist, or come nearer
to existing, which ones will other people want?
What will it be possible for everyone to have?
And how con we tie all these things together?
(blfleNB
Z DREAM MACHINES
4 APPARATUSES OF APPARITION
6 VIDEO
6 LIGHTNING IN A BOTTLE:
THE CATHODE-RAY TUBE
8 HOLOGRAPHY
8 Sandin's Image Processor
9 BODY ELECTRONICS
10 PICTURE PROCESSING
11 AUDIO li COMPUTERS
12 THREE COMPUTER DREAMS:
12 AI (artificial intelligence)
IS IR (information retrieval)
15 CAI (computer-assisted
instruction)
16 "No More Teachers’
Dirty Looks."
20 THE MIND’S EYE
(computer display)
24 COMPUTER MOVIES
26 PLATO
28 "Laws of the Universe
Hyper-Comics”
30 THE MIND’S EYE MORE:
3D LINE SYSTEMS
31 DeFanti's Coup de GRASS
32 HALFTONE IMAGE SYNTHESIS
1. Polygon Systems
34 2. Shades of Reality
(nicer greys)
37 3. Hardening of the
Artistries (special hardware)
39 4. Computer Image Corp.
40 THE MIND'S EYE MORE:
n Dimensions
41 The Circle. Graphics Habitat
42 The Tissue of Thought
42 How to Learn Anything
43 On Writing
43 Tho Heritage
44 HYPERMEDIA, HYPERTEXTS
46 Engeibart
48 FANTICS
S2 T1IINKERT0YS
56 XANADU
58 WHAT NELSON IS REALLY SAYING
59 FLIP OUT
(Note: this thesis is being advanced
only half-seriously. There have been a
number Of exsctly-dreamful Frenchmen, and
for this throe-nationality split to be
really true, they would all have to have
come from Alsace, next to Germany: Jule.->
Vorne, Daguorrc, the brothers MontgoIfJu. ,
the brothers Lumiere, to name a few.)
me uGfND of wee-kAk)
In the lantaaiea of their aubjeel*. which they
fed ere the precunor* ol new artiaiic image*
ihit will in turn actualize thermelyex a» another
form of being, Marten and Hmuton aee * new
here figure constantly recurring. Thia new hero
ia not the old ‘‘hero of * thouaand face*,” the
individualist who auffera, dica, and l» reborn,
alaughtering and conquering along the way. In-
atead, he ia Protean, capable of infinite change*
in appearance and llyle, a magician, a Baltha¬
zar bringing gift*. He rupture# ralegoriei and
confutes the aenaea, and in doing ao he hold*
out the promise of fuaion on a higher level.
If auch • hero were to become the model (or
the approaching age, he would probably not be
the founder of a maaa moremenl or the god of
a new religion. He would be more rluxive, more
changeful than hia predeceaaora. He would be ■
aorcerer who Ircala the external world and the
internal wozld on equal term*, giving apirit In
the former and fleah to th* latter. He would be
a mailer of paradox and a player of gamm,
•peaking a new language. Hi* one prayer might
1i the line* of Blake:
May Goi m keep
F root liMfU action
Amt Newton "a Jaap.
— Kenneth Cavamier,
"Voyag« °f tl% * P*yokenaut*."
Harper'*. Jan 74, p. 74.
grandfather,
Uieodor Hoi m.
APfW/tS
or AfP^iTiQM
It H«mt different companies are all the
time Introducing wonderful new devices that will
revolutionize, uh. whatever It 1 b we do with. uh.
Information and stuff. Things you'll attach to
your TV to get highbrow programs or dirty movies.
Microfilm devices that will shrink the contents
of the Vatican Library to a dot on your glasses.
Goggles that show you holographic color movies.
A pince-nez that lets you see the future. And
so on.
Reading Popular Mechanics or the Saturday
review of patents in the New York Times, you
get the idea of Something Big. New and Wonder¬
ful About to Happen, so we'll all have access to
anything, anytime, anywhere.
But it’s been that way for decades, and
with certain exceptions hasn't happened yet.
Here are some things that have caught on,
and are mostly familiar to us all.
Book. Newspaper. Magazine. Radio (AM).
Phonograph record (78). Tape recorder, J".
Black-and-white television. Radio (FM). Phono¬
graph record (33). Phonograph record (45).
Color television. Tape cartridge (i"). Tape
cassette (Philips, ca. 1/8"). Stereo records
and tapes. Oh yeah, and movies: 3Smm, 16mm,
8mm, Super 8mm. Carousel projectors. View-
master stereo viewers.
Here are some things in the process of
catching on (and not assured of success):
Quadrophonic sound. Dolby. Chromium, dioxide
tape emulsion. Super 16 movie format.
But for everything that did catch on, dozens
didn't. Some examples: 12-inch 45 rpm records.
11.5 millimeter movies. RCA's Hnch tape cart¬
ridge. which became a model for the much smaller
Philips. Wire recorders.
Then there are the things that caught on
for awhile and went away. Stereopticons (and
their beautiful descendant, the Tru-Vue, which
I loved as a kid). Cylindrical recordings.
Piano rolls. And so on.
Then there are the video recording sys¬
tems. CBS' EVR died before it got anywhere.
RCA's SelectaVision isn't out jret. 2-inch quad
is standard in the studios, jhinch Porta-Pak
is standard among the Video Freaks, and it looks
like Sony's 3/4" cartridge will win as the main
sales and storage medium. (The Philips system
here looks as though it won’t make it, and 1-inch
is dubious.) But what's this we hear about
video disks (twenty-five years after they announ¬
ced Phonerision. Ah, well.)?
The thing is, so many of these things seem
to sound alike. They all mention "information
retrieval," education, technology, possibly "the
information explosion" and "the knowledge in¬
dustry." Press releases or effusive newspaper
articles may use phrases like "space-age."
"futuristic," "McLuhanesque" or even "Orwellian"
(though few people who use that word seem to
know what Orwell stood for; see p ).
And the intimidating company names!
Outfits with names like General Learning, Inc.,
or Synergistic Cybernetics, Inc., or even
Communications | Research (Machines, Inc.
Surely such people must know what they are
doing, to use such scientific-sounding phrases
as these!
Then there are the business magazines.
In the late sixties they were talking about "The
Knowledge Industry" (a fiction, it turned out,
of an economist's lumping a lot of things together
oddly). Now they talk about the Cable TV out¬
fits and the Video Cartridge outfits as though
they’re the cat’s pajamas.
Eablup
in Nm
of 2d International Animation Film Festival
iork, Jan 74. ©Malt Disney Productions.
r t/eec’f SfjOfc) Btlt'NKf OKC MOVSOSWSSS —
You Can’t Tell the Experts Without They Program You
(Cf. "Calling n .Spade a Spade, p J > )
BW15 iM TcWb
Guy_’a Background Toll-Tale Phraaes fc Jargumentatlon
Television:
1. Video freaks
2. Network People
3. Cable Operators
Moth/Engineering
Display Engineering
Programmed
Instruction,
Computer-Assisted
Instruction
Publishing
Advertising,
Public Relations,
Marketing
Artificial Intelligence
McLuhanatic
Nelsonian
"Media" (meaning television );
"Software" (meaning videotapes).
"Programming" (meaning competitive scheduling);
"Software" (meaning fixed-length TV shows).
Head end, upstream t downstream, back-channel,
"interactive TV" (meaning any form of interactive
computer system they can get in on).
information theory, channel capacity, bandwidth,
feedback, anything complex and irrelevant.
Full duplex, echoplex, aspect ratio, scroll, cursor;
"information transfer" (meaning telling or teaching);
"data delivery" (act thereof).
"Software" (meaning sequential or branching tell-t-
test materials); "Programming" (creating these);
reinforcement schedules (meaning presentational order);
"inputs" (meaning ideas and information); "feedback"
(meaning replies); "simulations" (meaning pictures or
events a user can influence).
"Software" (meaning books).
"Demographics" (meaning factions); campaign mrolegy
(meaning how you hit a market); "penetration"
(meaning extent to which your stuff catches on);
"Programming" (meaning anything whatever).
Anything mathematical; theorems, discriminators, neural
nets: "programming" (meaning setting up anything
very complicated and incomprehensible).
Global Village, mosaic, surround; "Programming"
(meaning psychological indoctrination): anybody
else’s terms, dynamically infused with new senses.
Medium (meaning stabilized presentational context);
Writing and Creation (meaning thoughtful production
of something presentable, whether sequential or not,
in a medium); "Programming" (meaning giving
exact instructions to o computer); media integrity,
inventions & conventions: hypertext, thinkertoy, fantics.
Having spent some considerable time around
and among these areas, I have developed consid¬
erable cynicism and a bad case of the giggles.
Originally it all seemed to fit together and to be
leading somewhere, but talking to people at all
levels, and either giving advice or trying to
interpret the advice of others, I am convinced
that what we have here in this whole audio¬
visual-presentational whizbang field is nothing
less than a very high order of collective insanity.
The strange way companies adopt and drop var¬
ious product lines, and verbalize what they think
they are doing, seem to me a combination of
lemmingism and a willingness to follow any Auth¬
ority in an expensive suit. I have talked to
enough vice-presidents and presidents of compu¬
ter companies, publishing companies, networks,
media outfits and so on, to be totally certain
that they have no special knowledge or unusual
basis of information; yet these people's remarks,
as amplified through the business reporters,
send the whole nation a-dithering. There are
times I think everybody in Medio is either deluded,
misguided, lying or crazy.
THREE CRUCIAL POINTS.
1. SYSTEMS "IN THE HOME."
The emphasis has changed from trying to
sell snazzy systems to the schools (which don't
have the money) to the home. This in turn
has convinced most people that the new systems
have to be very limited, like jimmied-up TV sets.
(We easily lose track of the fact that you enn
have anything "in the home" if you want to pay
for it; and an economy in which Marantzes and
snowmobiles have caught on big indicates that
some people are going to be willing to pay for
really hot stuff.)
2. CATCHING ON.
The key question is not how good a system
is in the abstract, but whether it will catch on.
(Obviously if we're public-spirited we want the
best systems to catch on, of course.)
This matter of Catching On is a fickle and
crucial business.
According to one anecdote, Mr. Bell
couldn't interest anyone in his invention, which
he was showing at some trade fair. Then who
should come by but the Emperor of Brazil (!),
who was about to leave with his retinue of ad¬
visers. "What is that?" asked the Emperor of
Brazil. "Nothing to bother with," they said, and
tried to rush him by, but he stopped and loved
it, and ordered the first pair of telephones sold.
This made the headlines, and the sale of tele¬
phones began.
Another anecdote. It is legendary that
inventors overvalue their own work. Yet after
Thomas Edison had invented the kinematograph,
or "moving picture," a device you looked into
turning a crank, he declined to build a projector
for it, saying that the novelty would wear off .
Obviously he did’t quite see what "catching~on"
would mean here.
Wonderful Systems That Were Gonna Be
WHEiec
I once reud a mind-blowing review article in
Films in Review , early sixties I think,
on schemes to make three-dimensional
movies before 1930 . There were dozens.
Then there was that multiscreen film Napoleon
-- a legend-- done in the nineteen-twenties.
(That one really existed.)
PhoneviBion . about 1947 or so, was going to
store a half-hour movie on a 12-inch disk.
Did they get the idea from the LP? Did
they really think they could do it?
The German photo-gizmo, around 1950: a special
camera that supposedly created a sculpture
of what it was pointed at. (But how did
it know what was behind things?)
A weird lens around 1950-- I think it was depic¬
ted as having a blue center and a red peri¬
phery, like a fifties hoodlum tail-light--
that was somehow going to find "residual
traces" of color in black-and-white pictures,
and make 'em into color, zowie, just by
copying them.
Then there was the Ponacolor Cartridge. During
the Days of Madness-- 1968. I think it was
--a rather good little movie gadget was
being pushed by a firm called Panacolor.
It had ten parallel movie and audio tracks,
I believe, on a 70mm strip. The prototypes
were built by Zeiss.
Their idea was that this was a com¬
pact movie projector. 1 kept trying to per¬
suade the company's president that they had
inadvertently designed a splendid device
for branching movies (see "Hyperfilms,"
P
Exercise for the reader: map out prop¬
erties of the branching and expository
structures implicit in such a device. (It's
one-directional, Gotta rewind when you
get to the end. But you can jump between
tracks when it seems appropriate.)
Anyway, it’s gone now.
DM S
The Great Robert Crumb.
(From Za£ Comix HO.)
"t, _
K .W*i
Itaf ik tVf "
ttitre is Re mus*. 1
— f^er* Ryssiku proveri.
* Irycitii .
* * fr* v 4 » •
HARDWARE, SOFTWARE AND WHATNOT (reprise)
Among the many odd things that have
resulted from the collision of computer people
with educators, publishers and others has been
the respectful imitation of computer ways by
those who didn't quite understand them. Again,
the cargo cult.*
The most dismal of these practices has been
the adoption of the term "software" for any intel¬
lectual or artistic property .** This wholly loses
the distinction, made on the other side of the book,
between:
hardware (programmable equipment)
software (programs, detailed plans
of operation that the hardware
carries out)
contents or data (material which is
worked on by, moved in or
presented by the hardware
under control of the software)
In other words, hardware and software
together make an environment ; data or contents
move and appear in that environment.
The publishing-and-picturefolk have missed
this distinction entirely. Not realizing that their
productions are the contents (material, matter,
data, stuff, message...) that come and go in the
prefabricated hardware-software entironments,
they have mushed this together into a state of
self-feeding confusion.
(The matter has not been helped by the
computer-assisted instruction people— see p. I 5
— whose branching productions seemed to them
enough like computer programs to be called
"software.")
* Primitives exposed to "civilized" man imitat*
his ways ridiculously 4n religious rituals,
hoping for the shipments of canned goods,
etc. that hia behavior seems to bring down
from parts unknown.
**"Mere corroborative detail,
to enhance an otherwise
uninteresting narrative..."
Pooh-Bah,
Lord High
Everything
Else
3. STANDARDIZATION
In order for something to Catch On, it has
to be standardized. Unfortunately, there ts mo¬
tivation for different companies to make their own
little changes in order to restrict users to Its
own products. The best example of how to
avoid this: Philips patented its audio cartridge
to the teeth, but then granted everybody free
use of the patent provided they adhered to the
exact standardization. The result has been the
system's spectacular success, and Philips, rather
than dominating a small market, has a share of
a far larger market, and hence makes more
money. That's a virtue-rewarded kind of story.
The other problem with standardization,
though, is that we tend to standardize too soon.
We standardized on AM radio, even though FM
would probably have been better. (One Major
Armstrong, a great figure in the development
of radio, committed suicide when nobody would
accept FM. If he could only have heard our FM
of today, he might have said "Oh, nuts," and
lived.)
Another example. When they designed the
Touch-Tone phone pad. the Bell people evidently
saw no reason to have it match the adding ma¬
chine panel, so they put "1" in the upper left
rather than the lower left. Now there are lots
of people who use both arrangements, every day,
and at least one of them curses the designers'
lack of consideration.
Another interesting example of Catching
On: during the early sixties, it was fun being
at places where they were just getting Xerox
copiers for the first time. Everyone would ar¬
gue that nobody needed a copier. Then, grud¬
gingly. one would be ordered. The first month's
use invariably would exceed the estimate for the
first year, and go up and up from there.
The worst aspect of the confusion among
the corporations is that certain deficiencies and
crudities of vision slip into the mix. Unless
our new media and their exact ramifications and
concomitants ore planned with the greatest care,
everybody stands to lose. We must understand the
detailed properties of media. (The first question
to ask, when somebody is showing you the
Latest and Greatest, is: "What are the properties
and qualities of the medium?" The followup
questions come easily with experience: How of¬
ten do you have to change it. what are the bran¬
ching options, what part could somebody acci¬
dentally put in backwards, are there distracting
complications? etc. )
I am unpersuaded by McLuhan. His in¬
sights are remarkable, yet suspicious: h£ sup ¬
poses that electronic media are all the same . How
can this be? Here we may now decide what elec¬
tronic media we want in the future— and this de¬
cision, I would say, is one of the most Important
we have to face.
The engineers seem to be quite the oppo¬
site of McLuhan: somehow to them it's always a
multiple-choice, multi-engineering problem, dif¬
ferent every time; "this technique is good for A,
that technique is good for B." But the net ef-
fect is the same : "electronic media are generally
the same." I would claim that the're all differ ¬
ent , all ten million of them (TV being only one
electronic medium out of the lot), and the dif¬
ferences matter very very much, and only a few
can catch on. So it matters very much which.
Some are great, some are lousy, some are sub¬
tly bad, having a locked-in information structure,
built deep-down into the system. (Example:
the fixed "query modes” built into some systems.)
One last point. Everybody only has a
24-hour day. Most people, if they increase con¬
sumption of one medium (like magazines or books)
will cut down on another (like TV). This dras¬
tically reduces the sorts of growth some people
have been expecting. Except . now, if we can
begin to replace some of the inane paper-shuffling
and paper-losing of the business world, and
replace the creepy activities of the school (as now
generally constituted) with a more golden use of
time and mind. Read on.
"The Emperor has no clothes on!"
Small Boy
(name withheld)
>-h
Last year I actually heard a phone company
lecturer aay that in the future we
will hBve "Instant Access to Anything,
Anytime, Anywhere."
What they're pushing is Plcturephone, which
it seems to me is unnecessary, wasteful
and generally unfeasible.
(See: Robert J. Robinson, "Picturephone— Who
Needs It?”, Datamation 15 Nov 71, 152.)
0\l 05'KfTS-
In any medium— written, visual, filmic
or whatever— you generate instantaneously
an atmosphere, a patina, a miasma of style,
involvement, personality (perhaps implicit) ,
outlook, portent. Consider—
The complacency of the Sulzbergers'
New York Times --
The cynicism and mischief of Krassner's
Realist—
The perkiness and sense of freedom of
"Sesame Street"—
The personalized, focussed foreboding
of Orson Welles films: as distinct
from the impersonalized, focussed
foreboding of Hitchcock—
Next to this matter of mood, all else pales:
the actual constraints and structures of media,
the expositions and complications of particular
cognitive works and presentations within media,
are as nothing.
IN THE WSHPOrf
Time after time, the educational establishment has
thought some great revolution would come through getting
new kinds of equipment into the classroom.
First it was movies. More recently it's been "audio¬
visual” stuff, teaching machines, film loops and computer-
assisted instruction.
In no cases have the enthusiasts for these systems
seen how the equipment would fit into conventional edu¬
cation— or, more likely, screw the teacher up. Teachers
are embarrassed and flustered when they have to monkey
with equipment in addition to everything else, and fitting
the available canned materials into their lesson plans
doesn’t work out well, either.
The only real possibilities for change lie in systems
that will change the instructor's position from a manager
to a helper. Many teachers will like this, many will not.
NV (MfPJL ATItW
when somebody shows you an electronic or other
presentational system, device or whatever.
A certain kind of slight-of-hand goes on.
It's very easy to get fooled. They may show
you one thing and persuade you you’ve seen
another.
And if you're canny enough to ask about
a feature you haven't seen they'll always say,
"WE'RE WORKING ON IT."
It's only dishonest if they say, "It'll be ready
next month."
THWttTOi
A self-employed repairman of mobile homes
named Donald Wells has invented a solar-powered
tombstone that can show movies and still pictures
of the departed, along with appropriate organ
music and any last words or eulogies selected
by the deceased.
The device is activated by a remote control
device carried by a visitor to the gravesite.
The movies would be shown on a twelve-inch screen
mounted next to the epitaph.
"You could also have pictures of Christ as¬
cending to heaven or Christ on the cross, whatever
you want," says Wells. "It adds a whole new di¬
mension to going to the cemetery...."
Cleveland Plain Dealer
(Quoted in National Lampoon
True Paata. May 74, 10.)
3y minicomputer, through cablee and puffs of air.
©Walt Disney Productions.
DM 6
VIDEO rREAKS
VIDEO, it*, 4 n ,0 "
would you believe there vao television broadcasting
over the airwave* in the nineteen-twenties? The thing la,
it used bizarre -pinning equipment beoau*. there wer^no
cut- (-ee "Lightning in a Bottle," nearby.) Only with
«!. development of radar in World War II did there .1.0
cone a practicable Cathode Ray Tube, making home televi.-
ion feasible.
But the big companies were at first very conservative
in their marketing, figuring television would be a luxury
item onlv. It took a man named Madman Hunt*, who carica¬
tured himself In a Napoleon hat, to see that million* would
buy television If the price w«s right. So he "JJ* ™
Hunt* TV in the late fortie*. A* I recall, the Hunta TV
cost $100 and had one tuning knob . (This wa* less lntimi
dating than the row of knobs on more expensive sets.) I
don’t know how Muntz came out on it all, but hl * ® f
the mass market made the bigger corporation, realize it was
there. (This same thing may yet happen again in newer
media.)
Originally all there was was Krazy Hat and Farmer
Brown cartoons. But behold, sooner than you could say
"vertical hold," there were Sid Caesar and Imogene Coca
on the Admiral Show, and we were off.
A quarter of a century later, the best of television
is no better end the bulk of television is about as bad
a* It aver waa.
We "understand” television. That is. we know what a
TV show is, how it fits together and so on.
ICECUBES
But whst people don't realize about TV is that the
governing feature is the time-slot . In any medium with
time-slots, whether TV, radio or classroom education, the
time-slot rules behavior. Whatever can happen is as con¬
strained as Icecubes in a tray.
This is the limiting factor when optimists try to
use TV for teaching. If it’s coming over a cable, every¬
thing has to be scheduled around it, and the contents are
clipped and constrained to fit the time-slot. It may be
better with videotape.
CABLES
In the last dozen years, Cable TV, or CATV, has
become big business. A Video Cable is s high-capacity
electrical carrier that runs through a given neighbor¬
hood or region. Business and individuals may "sub¬
scribe" and get their own sets hooked onto the cable.
What this does first of all Is improve reception.
The fouled-up video picture caused by such extraneous
objects as the World Trade Center in New York can be
corrected by hooking into the video cable: you get a
nice, sharp picture.
In addition, though, the cable offers extra channels.
Now, the businessmen who have been throwing togeth¬
er these video cable outfits are aiming for something.
They have been thinking that these extra channels would
net them a lot of money: by showing things on them that
can't be offered on the air— highbrow drama, or perhaps
X-rated stuff— they could get extra revenue. (You'd pay
extra to watch it by buying an unscrambler, or whatever.)
This is turning into somewhat of a disappointment.
The cable people had foreseen, evidently, that people
would stay home in droves to see the new offerings on the
cable. In Show Business it’s easy to forget, though, that
everybody has only twentyfour hours in a day, and far les9
than 24 hours to dispose of freely; so every leisure occu¬
pation is competing with every other leisure occupation.
Moreover, the residual leisure occupation, when there's no¬
thing else to do, is TV. It would seem that few people
would watch more television if it were better, but many
would watch less if they could afford to go out.
EXTRA CHANNELS
In recent years, a number of extra channels have been
made available by law. These are the UHF, or Ultra High
Frequency channels. These, like cables, represent a con¬
sumer breakthrough but will have only negligible impact.
THE PROBLEM OF ORGANIZATION
Whatever else you may say about them, the networks
and TV stations are at least organized as going concerns
within the institutional structures of the country. Ideas
of "community television" and other such schemes which call
for some new form of social organization to spring forth
are about as plausible as "community control" of schools
and police— or at best likely to be as influential as
"coimnunlty social centers."
INTERACTIVE TV?
Some people, I won't say who, have gotten a lot of
money for something they call "interactive television."
What this turns out to mean is any form of computer time¬
sharing that will use home TV terminals and video cables.
The questions are why use home TV terminals and video
cables, insofar as they would seem to promise only com¬
paratively low-grade performance; and whether these people
have thought out anything about the potential characteris¬
tics of the various media they propose with such abandon.
Nothing I have seen or heard about this is reassuring.
"ALTERNATE" TELEVISION, or
In recent years, many young folk* have taken to video
aa a way of life . In the most extreme caeea they say things
like "the written word is dead,” prompted perhaps by McLuhan.
I have found it rather difficult to talk to video freake.
(It may be that aome of them are against spoken words as well.)
I really just don’t know what they're about.
The work of thee# people is as exuberant as it is strange.
I haven't seen much of it or understood much of what I have
seen.
In some cases, "alternative television" simply means docu¬
mentaries outside the normal framework of ownership and report¬
ing. In one example cited by Shamberg (see bibliography),
video freaks did excellent coverage of the 1968 Republican conven
tion. People were allowed to speak for themselves, unlike "nor¬
mal" TV journalism where "commentators" tell you what they see.
Now, this is hardly revolutionary} it is just good documen¬
tary-making that shucks dumb traditions artistically, much like
the Pennebaker films. However, video enthusiasts claim it is
somehow different, and indeed claim that video is different in
principle from films. I have been unable to get a satisfactory
clarification of this idea.
Video is being used in other ways, harder to understand, by
artist- (best defined as persons called "artists" within the art
world today). Very odd "video pieces" have been shown at art
shows, where the object 9eems to be to confuse the viewer— or
knock him into a condition of Enlarged Perspective, shall we say.
And a variety of non-objective videotapes are now being created.
(A gallery show in 1969 was called "Video as a Creative Medium"
— implying sarcastically that it had not been before, on the
airwaves.)
Some video freaks think of video as intrinsically radical or
Revolutionary. In this respect they differ interestingly from,
say, the editors of the National Lampoon . The editors of the
National Lampoon appear to be political radicals, but do not sug¬
gest that the very media of cartoon and joke-piece are themselves
revolutionary, some video freaks appear to be persuaded that the
medium of television itself is inherently a vehicle for change.
I can understand one interesting sense in which this may be
true: Shamberg talks about video as a method of self-discovery .
Seeing yourself on TV does, of course, confer certain insights.
But shamberg suggests it may expand people’s consciousness in
larger ways— allowing people to see the bleakness of certain
pursuits (he uses the example of Shopping), for instance. But
if this does hit home to people, it doesn't seem to me to be the
medium that's doing it but the selected content— as in all pre¬
vious media. Maybe I've missed the point in some way.
These developments are all very interesting. It can be
hoped that those trying to develop new forms of communication
will make an effort to communicate better with those who, like
the author, often cannot comprehend what they are doing.
" But decentralized transmission of
information should be dominant, not fugi¬
tive. Each citizen of Hedia-America
should guaranteed as a birthright access
to the means of distribution of informa¬
tion. "
(Shamberg, p. 67)
Hell, we went down there with our
Porta-Pak and tried to take it inside.
A guard came over and said we couldn't
and even threw one of us out of the booth
while the other was inside. A guard
telling you what to do in a cybernetic
environment?”
(Shamberg, p. 53)
("Cybernetic" is evidently a code
word here for what they think is
good, true, beautiful and inevi¬
table. ce. p. D/1
About the only generalization to be
made is that community video will be
subversive to any group, bureaucracy, or
individual which feels threatened by a
coalescing of grassroots consciousness.
Because not only does decentralized TV
serve as an early warning system, it puts
people in touch with one another about
common grievances."
(Shamberg, p. 57)
BIBLIOGRAPHY
Michael Shamberg and Raindance Corporation,
Guerrilla Television . (Holt, $4.)
TUBE, an underground TV magazine. $8/yr.
TUBE, 1826 Spaight St., Madison, HI
53704.
Cable Report, $7/yr. 192 N. Clark St.,
Room 607, Chicago. Samples $1.
"SCANDAL IS RAMPANT in the cable
television industry. Only Cable Re¬
port follows cable TV developments
from the citizen's perspective and
tells you what’s happening and what's
going wrong." Ad in Chicago READER.
Nicholas Johnson, How to Talk Back to Your
Television Set . Bantam, 95t
If wt HtyrtT rv whckj we
Wt'3 H*vc K BfntUYSTWVoU.
TK’t W 1 ok t 1 *- Uj|"
Ike KD
UWWMG
IN A BOTTLE
th( Cat>{oj£-my rose
A cathode-ray tube is actually a bottle filled
with a vacuum and some funny electrical equip¬
ment. The equipment in the neck of the bottle
shoot b a beam of electrons toward the bottom of
the bottle.
This beam of electrons is called, more or less for
historical reasons, a cathode ray . Think of it as
a straw that can be wiggled in the bottle.
Actually the bottle is shaped so as to have
a large viewing area at the bottom (the screen),
and this screen is coated with something that glows
when electrons hit it. Such a chemical is called
a phosphor .
Now, two useful things can be done with this
beam.
1) It can be made brighter by increasing
the voltage, which increases the
number of electrons in the beam.
2) The beam can be moved! That is, it
can be made to play around the face
of the tube the way you can slosh
the stream of a garden hose back
and forth on the lawn; or wiggle a
straw in a coke bottle. The beam
can be moved with either magnetism
or static electricity. This is applied
in the neck of the bottle— or even
from outside the neck— by deflection
plates . whose electrical pulsations
determine the pattern the beam
traces on the screen. (Note that the
beam can be moved on the screen at
great speed.)
The vertical deflection plates can pull the
beam up or down on the screen, controlled by
a signal to them;
the horizontal deflection plates can pull the beam
sideways on the screen, controlled by a signal
to them.
By sending combined signals to both hori¬
zontal and vertical deflection plates, we can make
the end of the beam-- a bright dot on the screen,
sometimes called a flying spot -- jump around in
any pattern on the screen. A repeated pattern
of the beam on the face of the CRT is called a
raster .
From these two capabilities— brightening
and moving the beam-- a number of very special
technologies emerge:
TELEVISION uses a zig-zag scanning pat¬
tern which repeats over and over.
This zigzag pattern is Biways the
same, night and day.
You can usually see the lines clearly
on a black-and-white set. The pic¬
ture consists of the changing pattern
of brightness of this beam, which
comes in over the airwaves us the
television signal.
£ZI
DM 7
RADAR DISPLAY uses a CRT to show reflec
ted images around where the radar
antenna is standing. This uses a
scanning raster of a star shape,
brightening the beam when reflected
COMPUTER CRT GRAPHICS generally use
the CRT in still another way: the
beam is moved around the screen in
straight lines from point to point.
(Between different parts of the pic¬
ture the beam is darkened, turned
very low so you don't see it.)
Because the image on a normal
CRT fades quickly, the computer must
ordinarily draw the picture again and
again and again. (Methods for this
are discussed on p. PH Z2*3.)
SPECIAL KINDS OF CATHODE-RAY TUBES
The CRT is not merely a single invention,
but an entire family of inventions. The ordinary
CRT, which we have discussed, is viewed at one
end by a human being, has an image which fades
quickly, and can have its flying spot driven in
any kind of raster or pattern.
Here are some other kinds of CRT:
The picture transmitter , which has different
versions and names: Vidicon, Image Orthicon,
Plumbicon, etc. THIS IS THE MAGICAL DEVICE
THAT MAKES THE TELEVISION CAMERA WORK,
AND YET, BY GOSH, IT'S JUST ANOTHER CRT.
Except instead of the picture coming into it as
an electrical signal and out of it as an optical
image, the picture comes into it as an optical
image and goes out of it as an electrical signal.
How can this be?
The tube sits inside the television camera,
which is an ordinary camera, like, with a lens
projecting a picture through a dark chamber
onto a sensitive surface. But instead of the
surface being a film , the surface is the faceplate
of a CRT with some kind of a special pickup
phosphor:
TV C*W-
The electron beam, which is just like any
other electron beam, is made to zigzag across
the faceplate in a standard television raster.
And the special phosphor of the tube measures
the brightness of the picture at the spot the
beam is hitting. I have no idea how this hap¬
pens, but it’s chemical and electronical and mys¬
terious, and iB based on the way the phosphor
interacts with the light from one side and the
electrons from the other side at the same time.
Anyhow . a measurement signal comes out of the
faceplate , indicating how bright the projected
picture is in the very spot the electron beam is
now hitting.
As the beam crisa-crossea the faceplate in
the zig-zag television raster, then, a continuously
changing output signal from the faceplate shows
the brightnesses all across the successive lines
of the scan.
And that is the television signal. Together
with synchronizing information, it’s what goes
out over the airwaves, down your antenna and
into your set. Your set, obeying the synchron¬
izing information, brightens and darkens its own
beam in proportion to the brightness of the
individual teeny regions of the faceplate in the
television camera. And this produces the scin¬
tillating surface we call television.
The color tube is a weird beast indeed.
There are several types, but we'll only talk
about the simplest (and many think the best),
Sony's Trinitron(TM) tube.
This is an ordinary CRT which has, in¬
stead of a uniform coating on the faceplate, tiny
vertical stripes of three primary colors— red,
blue and green. (You thought the primary col¬
ors were red, blue and yellow, didn't you. If
you're mixing pigments that happens to be true.
For some ungodly reason, however, if you’re
mixing lights . the colors that yield all others
turn out to be red, green and blue; it turns out
that yellow light can be made out of red and
green. If you don't believe me go to a chintzy
hardware store, get a red and a green bulb,
turn 'em on and see what happens in a white-
walled room.)
At any rate, color television uses addi¬
tional color signals, and in the Trinitron these
control the response of the faceplate. If the
color signal says "green" as the electron dot
crosses a certain part of the screen, the color
signal tells the green stripes that they're free
to light up when hit. If it's Yellow Time, the
signal tells both the red stripes and the green,
and so side by side they light up red and green,
as the beam crosses them, but the total effect
from more than a few inches is Yellow.
Most American color TV sets, however, at
least up till this year, used something very dif¬
ferent, something entirely weird called the
Shadow Mask Tube. I'll spare you the picture,
but there were several different electron beams
— often referred to jokingly as the "red electron
beam," "blue electron beam" and "green electron
beam," though of course they were identical in
character. These hit a perforated sieve, up
near the screen, called the shadow mask , and
the color signal tweaked the unwanted beams
so they did not hit different-colored phosphor
dots that were intricately arranged on the screen.
I’m sorry I started to explain this.
Multi gun tubes have more than one electron
gun and more than one electron beam. They
can be used in different ways (aside from the
old shadow-mask TV tube, mentioned above).
The storage CRT comes in two flavors:
viewable and non-viewable. But what it does
is very neat: It holds the picture on the screen.
The mechanisms for this are of various types,
and it's all weird and electronic, but the idea
is that once something is put on the screen by
the electron beam, it stays and stays. Up to
several minutes, usually. The main manufac¬
turers are Tektronix. Princeton Electronic Pro¬
ducts, and Hughes Aircraft; each of these three
has a product that works by a different method.
Note: Tektronix* tube i$ built into a num¬
ber of different computer displays, and is rec¬
ognizable by Its Kelly green surface. They
themselves make complete computer terminals
around thiB scope for $4000 and up, but lots of
other people put it in their products also. It
shows whatever has already been put on the
screen, and the electron beam does not have to
repeat the action. However, it usually only
stays lit for about a minute.
Princeton Electronic Products (guess where)
is a much smaller outfit, so perhaps it is appro¬
priate that they make a much smaller storage
tube. It is about one inch square at its storage
end, and you don't look at it directly. Instead,
an image can be stored on it either wth a TV
raster or by computer-driven line drawing.
After the image is stored on it, though, it func¬
tions as a TV camera : the picture stored on the
plate can be read out with a scanning raster,
exactly as if it were a picture transmitter in a
television camera. The Princeton folks have
built a quite expensive, but quite splendid,
complete terminal around this device: it can hold
both video and computer-drawn pictures, super¬
imposed or combined, and sends them back out
in standard black-and-white TV. $12000.
CRTS which bring in a picture one way
(such as a video raster) and send it back out
another way (such as by letting a computer
search out individual points) are called scan
converters.
A word about this last method. It is often
desired by computer people to turn a picture
into some form of data (see p. | (J ). Scan conver¬
ters, usually by the three manufacturers named
above, can be hooked up to let the computer pro¬
gram poke around in the picture and measure the
brightness of the picture in arbitrary places.
A device which examines the brightness of some¬
thing in arbitrary places is called a flying spot
scanner.) Here are some different kinds of
flying-spot scanners:
wmi a/ / store* [\cfvit iu *wJi(e
y\^tc ifclf u »\e*fvT*A
1 it***5*
For instance, one gun can be driven in a
video raster, to show television, while another
gun can be used as a computer display, drawing
individual lines with no regard to the TV pattern.
1 have heard it said that it might be pos¬
sible to build a CRT with a changeable mirror
surface: that is, the screen becomes mirrored
temporarily where it is being hit with the elec¬
tron beam. Interesting. This would mean that
you could make computer displays (and TV)
bright and projectable to any degree, say. by
pouring a super-intensity laser beam on it. "Be
great for writing 'Coca-Cola' on the moon," says
a friend of mine. If you believe in astral pro¬
jection.
BIBLIOGRAPHY : Color TV Training Manual , Sa»a & Co./
Bobbs-Merrlll ($7), is a veil-illustrated and
Intelligent introduction to the TV use of CRTs,
III
RETURN of
SW 5 _
peocssscE.
Dan Sandin,
professor of Art
at V. of Illinois,
Chicago Circle,
says very vise
things (having
been a physicist!,
and We vers going
to have a whole
section on that,
but as you can see,
there wasn't room. |
Daniel J. Sendin (pronounced san-DEEN) has
■pent the lest several years putting together a
device he currently call* the IP (Image Proces¬
sor). It’s * system of circuits for changing
and colorizing TV. What follows Is the first
published description of It.
I regret that the following 1* probably
one of the most difficult sections of this book.
(If you know nothing about video, read M i r .. n i qm g-
first.) Dtir>-7
The Ides is basically to create a complete¬
ly generalized system for altering the color and
brightness of video images. (I.e., the system
does not move them on the screen. Thus it
differs from the Computer Image line of video-
twlstlng graphics systems, which alter positions
of objects; see p. DM ^ . Note also that
r'ather similar facilities exist as part of, e.g.,
the Scanimate syatem, f• DM 31 • >
This means that basically Sandin's system
plays with the part of the TV signal called z,
or brightness (as distinct from x or y, the sig¬
nals for horizontal and vertical movement of the
)-
P M) 6 7
Now, as a physicist and field-theoretician,
Sandin approached this as a problem in generality;
and Indeed, the style of generalization should be
appreciated. Sandin repeatedly chose flexibility
and power rather than obviousness In the parts he
created. The resulting system Is both parsimon¬
ious and productive.
His first Important decision was that all
parta of the syatem should be compatible and ldlot -
proof . so that any user could frivolously plug It
together any way at all without burning out the
circuits.
Indeed, Sandin decided to build It like a music
synthesizer: by making all systems electrically com¬
patible (as they are on the Moog and its progeny),
any signal can be used to alter or Influence any
other signal. This is a very profound decision,
whose far-flung results have not yet been fully ex¬
plored even among Sandin'a rather fanatical stud¬
ents.
Basically, the Incoming video image Is "strip¬
ped" of its synchronizing Information, so that all
signals turning up in the guts of the machine may
be freely modified. Only at the final output stage
are the jots and tittles of the video signal put back
Thus the first and last blocks of the Image
Processor act like bookends, between which the other
modules have their fun. The firat block makes the
incoming signal Into "naked" video, the last block
dresses it up respectably again.
For the sake of clarity we will refer to the
outputs as pictures , or as black, white or grey,
which they would be if they went straight out to a
screen; but they may be turned back Into the system
and function as inputs as well. "White" means +.5
volts, "black" means -.5 volts.
Let us consider, then, Sandin's modules and what
they do Individually to the brightness signal i.
Combinations are beyond the scope of this article
What Dan's proaeesor
can do to television
is not to be believed.
Savage colors or
delicate off Whites,
solarisatione and
pictures on top of
pictures. Then thr .■
"video feedback"
(pointing a TV carter .
at a TV screen),
the system can generate
throbbing animated
oobwebs and spirals
of its own. Shown.
Holog^M- ,
• I. IC
]U>f- ,, Wo*
I?"*
• EMer taUg-u of {jwfTKAVj
HtT FU-K OCI6JHMLY
& is Mow
1. ADDER-MULTIPLIER,
channels, either directly
This combines two input
as specified by a third.
Diagram of how hologram is made, p. DM Z°.
tolOGWsWf,
Kfr ft*
' ^4 how, vu 4 v u "
The channel A inputs are added together and-mul¬
tiplied by C; the channel B inputs are added together
and multiplied by the reverse of C; both results are
added to make the output. (NOTE: this unit is used
among other things, for fades and keying.)
2. COMPARATOR. This Is like Kodalith film,mak-
lng an image into stark black and white. Its output
Is pure black or white. One Input signal (the video)
Is compared with another input signal (reference level,
other video, whatever).
While one Is greater the output goes all black,
snj while the other Is greater It goes all white.
3. VALUE SCRAMBLER. This Is a single module
dividing the picture Into eight levels. It may be
thought of as eight of the above comparators, divid¬
ing the brightness spectrum by quantum jumps. The
floor and celling of the signal to be divided are
specified by the two control channels, but the divid¬
ing lines between them are then automatically deter¬
mined. Each corresponding output level may be con¬
trolled by a knob.
v^e
Thus from a range of Input values, we get an
output step-function each of whose brightnesses is in¬
dividually adjustable.
Note that these devices may be arranged in
parallel, thus dividing the brightness spectrum into
as many levela as desired.
4. OSCILLATOR MODULE (very unusual). Sandin's
oscillators are voltage controlled, just like the ones
in music synthesizers. However, if given any kind of
a sync signal, they lock into the nearest multiple
(or submultiple) within the specified range. (But
then the control signal,if any, tweaks it higher or
lower.) Standardized output comes in sine, square and
sawtooth.
Holography Is one of those Modern Miracles
that we really can't get Into. It is mind-blowing,
influential, and of unclear Importance.
Theoretically predicted by Dennis Gabor, the
hologram (Creek "whole picture") was finally made
to work in the late fifties by Leith and Upatnleka.
Since then dozens of other types of holograms have
been experimented with, including color holograms,
movie holograms, video holograms, audio holograms
and gracious know what.
Basically a hologram Is an all-around picture.
It doesn't look like a picture, but looks like a
smudged fingerprint or other mistake of some kind.
Yet it is a marvel.
A basic hologram (— actually it should be
called a laser hologram or Lelth-Upatnleks holo¬
gram, but we’ve no time for such distinctions—)
is one of these smudgy pictures which, when viewed
under a proper laser setup,shows you a three-
dimensional picture. Worse than that: as you move
your head, the picture changes correspondingly.
It looks, not like the flat surface It Is, but like
a lit-up box with a model In It.
What does the hologram do? Actually It re¬
creates, not a single view, but the entire tangle
of light rays that are reflected from the real ob¬
ject. Even down to bright reflections, which
scintillate in the usual way, as from chromium.
The only problem: ordinarily they have to be.
used with laser light, which is spookily one-
colored .
Notes from all over: ert stylist Salvador Dali
presided at an unveiling of "the world's first 360°
hologram" at a New York gallery not long ago. The
subject was song stylist Alice Cooper.
The Haunted House at Disney World in Florida
will ride you through a building full of holograms.
That's one way to move through ghosts, all right.
There is a New York School of Holography.
6. FUNCTION GENERATOR. This device is hardest to
explain. Let*6 do It in terms of that first module, the
Adder-Multiplier. Know how the Adder-Multiplier puts out
either a positive or a negative picture, depending on
which input you select?
r ^
rr v*t«o
o^T v
«l**fcvew~I j
i <5W'*i
L_
___I
The two planned uses were A) with a sync, to
generate fixed patterns, and B) without a sync, to
generate movable patterns. If both Inputs are used,
it becomes a stubborn lock-on voltage-controlled os¬
cillator, which tends to grab at passing submultiples.
5. DIFFERENTIATOR. Basically this sees edges In
the picture, or any other part of a scan-line whose
color Is changing. Its output Is proportional to
chanRe occurring In the brightness of a scan-line,
As the Input goes from black to white Its output Is
light; as the input goes from white to black its out¬
put Is dark. (The input hole selected determines the
amount of multiplication.)
JT
nesses into three ranges, and multiplies each range posi¬
tive or negative . In proportion to ita own knob setting.
Thus the combined setting of the three knobs generat¬
es a "function," or curve, from the slopes of the Individ¬
ual settings. See graph. What in photography is called
"solar!zatIon" represents Just one of these combined set¬
tings. The others are nameless.
e*c4 10*5
Store
Of- doUTHOC
IM ««6
or
iwtot.
-J r.
'*tt of
(iwsaerttiK lelechJ
ij w< —
7. COLOR ENCODER MODULE. This is Che last block.
Into It go three signals, the desired rsd, blue and green;
and out comes standard NTSC video.
mf Eaa&kcs
"I aing the body electric ..." — Walt Whitman
There are various people who want to at¬
tach electronics to people’s bodies and brains.
There are basically two starting points
for this ambition. One is authoritarian, the
other is altruistic. 1 am not sure both schools
are not equally dangerous, however.
Let’s consider first the authoritarians.
Prof. Delgado of Yale has demonstrated that any
creature's behavior can be controlled by jolts
to the brain. Delgado has dealt especially with
the negative circuits of the brain, that is,
places where an electrical impulse causes pain
(or "negative reinforcement"). In Delgado’s
most stunning demonstration, he stopped a char¬
ging bull with just a teeny radio signal. En¬
thusiastically Delgado tells us how fine this
sort of thing would be for controlling Undesir¬
able Human Behavior, too.
Now, let's consider just what we're talking
about. In these experiments, needles are im¬
planted in the creature's brain. This can in¬
volve removing a section of the skull, or it can
be done merely by hammering a long hollow needle
straight into the skull and thus the brain.
The researcher, or whatever we want to call
him, had better know what he is doing. But due
to the remarkable mass action of the brain, the
destruction caused by such needles will have not
observable effects if done properly.
The hollow needle, once in place, becomes a
tube for shielded electrical wires, whose bare
metallic tips may then be used to carp' little
electrical jolts, to whatever brain tissue is
reached by the tip of the needle, whenever tiny
signals are applied.
Now there are regions of the brain, distri¬
buted irregularly through its mysterious contents,
which are loosely called the "pleasure" and
"pain" systems. They are called that because of
what the organism does when you jolt it in those
places*. (We do not know whether jolts to these
areas really cause pleasure or pain, because
these things haven't been done to human beings.
Yet. The creatures it has been done to can't
tell us just how it feels; thus "pleasure" and
"pain" are in quotation marks. For now.)
Anyway, what happens is this. If you stim¬
ulate a creature in the "pain" system it tends to
stop what it is doing-- this is called negative
reinforcement-- and if you stimulate it in the
pleasure system, it tends to do more of what it
was doing. Positive reinforcement.
Now, to some people this suggests wonderful
possibilities.
Delgado, for instance, believes that this
technology gives us everything we need for the
control of Anti-Social Tendencies. Criminals,
psychopaths and Bad Guys in general-- all can be
effectively "cured" (i.e., put on their best be¬
havior) by these techniques. All we have to do,
heh heh, is get into their heads, heh heh, habits
of proper behavior. And with these new techniques
of reinforcement, we can really teach 'em.
Unfortunately Delgado is probably right.
In principle this is just a drastic form of
behavior control on the B.F. Skinner model (depio
Nineteen Eighty-F our and A Clockwork
Orange). The new system is more stark - and start-
ling because of its violation of the individual’s
body interior, but not in principle different.
Skinner has the same naive, simpleminded sc
utions for everything. All "we" have to do¬
using "we" to mean society, the good guys good
guys acting on behalf of society, etc.-- is con¬
trol the behavior of the bad guys, and everythir
will be better, and "we" can accomplish anythim
"we" desire.
The reader may see several problems with this.
In the first place (and the last), there is
the obvious question of who we are, and if we are
going to control other people, who is going - Eo
control us.
Even if that weren’t a problem, there is the
more simpleminded question of who in the existing
system would use such techniques. It turns out,
of course, that they would be added to what is
laughably called the Correctional System, or even
more laughably called the Justice System. All
the sadists you could possibly want work there.
(And no doubt some very nice guys-- but experi¬
ments have demonstrated horrifically that decent
people, turned into "guards" even for a short time,
adopt the patterns of brutality we have known from
time immemorial.)
So, like truncheons and electric shock ther¬
apy and solitary confinement and everything else,
these techniques-- if they are used-- will enter
the realm of Available Punishments, not to be used
with clinical precision but with gratuitously bru¬
talizing intent, new tools for punitivity and
sadism. The "correctional” system would have to
be magically corrected itself before such tools
could he employed without simply making things
worse . And the prospoct is not good.
Such schemes grow, of course, from a carica¬
ture of the malefactor-- thinking him to be some
sort of miswired circuit, rather than a human being
caught up in anger, pain, humiliation and unem¬
ployment.
(There are also a lot of canards about Free
Will, but these do nothing for either side -in this
controversy.)
DM 9
ftVCf\0-ftC00STlt J)|L£>C>Kl£S
I originally hadn't intended to include any
thing like thin in the book, wanting it to be a
family-atyle access catalog and all that, but this
particular item seems fairly important.
Remember how we laughed at the Orgasmo-
tron in Woody Allen's Sleeper? WeU. it turns
out not to be a joke.
An individual named How (not Howard)
Wachspreas, electronickcr-in-realdenee at a San
Francisco radio station, has been developing just
that, except that he has more elevated purposes
in mind. The secret was broken to the world
in Oui magazine earlier this year; but Hefner,
the publisher, evidently held back the more
startling photographs of a model in electronically-
induced ecstasy.
Wachspress’ devices transpose sound (as
audio signals) into feelings ; you touch your
body with an open-ended tube or other soft
fixture attached to his device— which in turn
is attached to a hi-fi.
NEW FACULTIES
Starting from an entirely different outlook,
various designers and bio-engineers are trying
to add things to the human body and nervous sys¬
tem, for the voluntary benefit of the recipient.
A number of research and development efforts
are aimed at helping those with sensory impair¬
ments, and electronics obviously is going to
involved.
An example: a firm called Listening, Inc.
in Boston, founded by Wayne Batteau (whom John W.
Campbell considered one of the Great Men of Our
Time), devised a system for helping the totally
deaf to hear. Supposedly this could transmit the
actual sensation of hearing into the nervous sys¬
tem by some scarcely-understood form of electri¬
cal induction. The machine was sold off; whether
it ever got a safety rating I don't know.
This is the sort of thing people would like
to do for the blind, as well.
The sensations, it is claimed, are pro¬
found and moving. You may take them anywhere
on your body; the effect is deeply relaxing and
emotionally engrossing. Wachspress thinks he
has reached an entire neurological system that
wasn't known before, much like OldB’ discovery
of the "pleasure center" in the brain; he sees it
as a new modality of experience and a general¬
ization of music and touch. That is the main
point. "Hyper-reality" is where he says it gets
you: a point curiously congruent with the author's
own notions of hypertext and hypermedia as ex¬
tensions of the mental life.
This said, we can consider the prurient
aspects of Wachspress' Auditac and Teletac devi¬
ces (which he intends to market in a couple of
years as hi-fi accessories, b'gosh). When
played with the right audio, in the right places,
and a good operator at the controls, they provide
a sexual experience said to be of a high order.
Now, in principle, it might be possible to
transmit an image in some way to the actual vis¬
ual area of the cerebral cortex. (This might or
might not involve opening the skull.) Somebody's
working on it.
In a related trend, numerous design groups
are attempting to extend the capabilities of the
human body, by means of things variously called
possums , waldoes and telefactors .
"Possums" (from Latin "I can") are devices
to aid the handicapped in moving, grasping and
controlling. Whatever motions the person can
make are electronically transposed to whatever
realm of control is needed, such as typewriting
or guiding a wheelchair. ("Waldo" is Heinlein’s
term for a possum that can be operated at a dis¬
tance.)
In the space program, though, they call them
telefactors . A telefactor is a device which con-
verts or adapts body movements by magnification
or remote mimicking. Unlike possums, they are
meant to be operated by people with normal facul¬
ties, but to provide, for example, superhuman
strength: cradled in a larger telefactor body, a
man can pick up immense loads, as the movements
of his arms are converted to the movements of the
greater robot arms.
Telefactors can also work from far, far away.
Thus a man sitting in a booth can control, with the
movements of his own arms, the artificial arms of
a robot vehicle on another planet.
(This whole realm of sensory and motor mechan¬
ics and transposition is an important aspect of
what I call "Fantics," discussed on pp. t>i>i 7 a-ft).
Then there are those who, like Jlow Wachspress
(see nearby), want to expand man's senses beyond
the ordinary, into new sensory realms, by hooking
him to various electronics.
THOUGHTS
There are two problems in all of this. The
first and worst, of course, is who controls and
what w»^.l hold them back from the most evil doings.
Recent history, both at home and abroad, suggests
the answers are discouraging.
The second problem, wispish and theoretical
next to that other, is whether in turning toward
bizarre new pleasures and involvements, we will not
lose track of all that is human. (Of course this
is a question that is asked by somebody whenever
anything at all changes. But that doesn’t mean it
is always inappropriate.)
In the face both of potential evil and dehum¬
anization, though, we can wish there were some
boundary, some good and conspicuous stopping place
at which to say; no further , like the three-mile
limit in international law of old. I personally
think it should be the human skin . Perhaps that's
old-fashioned, being long breached by the Pace¬
maker. But what other lines can we draw?
Wachspress' work ties in interestingly with
today’s "awareness" movement, of which Esalen
is the spiritual center, which holds that we have
gotten out of touch with our bodies, our feelings,
our native perceptions. As such, the Wachspress
machines may be an unfolding-mechanism for the
unfeeling tightness of Modern Man-- as well as
a less profound treatment for "marital difficulties"
and Why-Can't-Johnny-Come-Lately.
Inscrutable San Francisco! Wachspress
gave a number of demonstrations of his devices
in Bay Area churches , until he became disturbed
at immodest uses of the probe by female communi¬
cants who had stood in line to try the machine.
(Auditac, Ltd., Dept. CLB,
1940 Washington St.,
San Francisco CA 94109.)
Harry Mendell, a good friend of mine, rigged an
interesting experiment while he was still in high school.
He used a little Hewlett-Packard minicomputer, which
the manufacturer had generously loaned to his Knights of
Columbus Computer Club of Haddonfleld, N.J.
Harry hooked the Hewlett-Packard up to a CRT display
(see pp. an fe-7, 6•««;>) • At the top of the CRT, following
his program, the computer continuously displayed the let¬
ters of the alphabet. A little marker (called a cursor )
would skip along underneath the letters, acting as a mar¬
ker for each of them in turn.
Harry rigged one more external device: a set of elec¬
trodes. These would be strapped, harmlessly, to the head
of a subject. Harry's computer program used these elec¬
trodes to measure alpha rhythm, one of the mysterious
pulses in the brain that come and go.
Every time the subject flashed alpha, Harry's program
would copy the letter above the cursor to the bottom of
the screen.
Sitting in this rig, subjects were able to learn,
rather quickly, TO TYPE WORDS AND SENTENCES. Just by
flashing alpha rhythm when the cursor was under the right
letters.
Jubilant, Harry showed this setup to an eminent neuro¬
physiologist from a great university nearby, a man special¬
ising in electrode hookups. Harry was a highschool student
and did not understand about Professionalism.
“What's so great about that?" sniffed the eminent
professional. "I can type faster."
So Harry dropped that and went on to other stuff.
At a tine when our "highest" leaders show
themselves preoccupied with low retaliations and
lower initiatives, we can wonder indeed if it is
not more important to prevent anyone from ever
getting this kind of control over humans than to
facilitate it.
The prospects are horrorshow, me droogies
BIBLIOGRAPHY
T.D. Sterling, E.A. Bering, Jr., S.V. Pollack
and H. Vaughan, Jr., Visual Prosthesis :
The Interdisciplinary Dialog . ACM
Monograph. $21.
OZI
DM 10
PiCftfe Fepce&Kfcs-
"Picture proceeding" ie an important technology,
largely separate from the rest of computer graphics.
It means taking an incoming picture, usually a photo¬
graph, and doing something to it. (Some now call this
area "computer pictorlcs.")
First of all, there Is Image enhancement . This
means taking pictures, dividing them into points whose
brightness is separately measured,and then using spec¬
ial techniques for making the picture better- To
people familiar with photography, this may seem im¬
possible; to photogrsphers it is a maxim that photographs
always lose quality at each step. Nevertheless, various
mathematical techniques such as Fourier Analysis (men¬
tioned elsewhere) do just that, producing a new data
structure improving on the original data. Surfaces ap¬
pear smoother, edges sharper.
(These techniques have been extensively used to
clean up photographs sent back from our unmanned space
vehicles— both those used exploring other planets and
those spying on our own— see Secret Sentries in Space ,
Bibliography.)
Then there are recognizers — programs that look at
the data structure from an input picture, and try to
discern the lines, comers and other features of the
picture. (While your eye instantly sees these things,
computers do not , and must look at the dots of a picture
one-by-one. How to analyze pictures in such tedious se¬
quences is no simple matter.)
For recognizing more complex objects In pictures—
boxes, spheres, faces or whatever— more complex struc¬
ture-analyzing programs are necessary. As the possibil¬
ities of what might be in a picture increase, these in¬
creasingly become guessing programs. (This becomes a
branch of artificial intelligence , a misleading term for
a curious field, discussed on p^.' , l2"ty*)
Numerous computer people think it is important to
match up our computer graphic display systems (described
variously on this side of the book) to image input sys¬
tems. This is a matter of taste.
These are all basically techniques for making a
data structure . Any data stored in computers must have,
of course, a data structure— which basically means any
arrangement of information you choose. (see p.26 -< f-)
These various techniques are intended to create re¬
duced data structures, recording only the "most impor¬
tant" data of the picture— from which new and varying
pictures may be created, reflecting the "true" structures
originally shown in the initial picture. How much it's
going to be possible to create these data structures
from Input pictures remains to be seen; some of us think
it’s not going to be generally worthwhile.
BIBLIOGRAPHY
Azriel Rosenfeld, "Progress In Picture Processing
1969-71." ACM Computing Surveys June 73,
81-108.
Ken Knowlton and Leon Harmon, "Computer-Produced
Grey Scales." Computer Graphics and Image
Processing . April 72, 1-20.
Philip J. Klass, Secret Sentries in Space . Random,
1971, $8. Interesting general book on geopo¬
litical strategy and orbital photoreconnais¬
sance. "Now-it-can-be-told" approach.
#|T 6 tUT* PICTUK €5 Of
Voor own HORt & 0 MTY,
OR. UHhTf\|ER.
You can get pictures of
any area you want from ERTS
(Earth Resources Observation
Systems) satellites, from
EROS Data Center (no, not a
dating service, see p. ( o*j ),
Sioux Falls SD 57198, or call
605/594-6511 bet. 7 AM & PM
central time.
r
6TT
LIZZIE OF THE LINEPRINTER
A famous converted picture. The painting
was divided into 100,000 brightness-measured spots
by H. Philip Peterson of Control Data Corporation;
then each dot was made into a square of overprinted
letters on the printing device. The program allow¬
ed 100 levels of grey. Above: Control Data's ver¬
sion, reprinted by permission. Below: a cut-down
version that often turns up. (From original flat
2D artwork by Len DaVinci of Medici Associates.)
NOTE: this is not a "computer picture.'' There
is no such thing. It's a quantization put out on
a lineprinter.
HHinnmmimt iff mi i-»i
hhiimimi mi'Mnmh..
diu tiJ i t iiiim
hh^mim h null '■■tmtimt Htr frtv MaitaiM* •>«
i m i n -*■= - t-i 1i?
■J'J'.'S 1 MSI I I Sf m It BE H 11 i % I t-j«.s.i li V ■ * II! 11 H 1 U <! 1»11 Kt » * * f l .*-:**♦»
MxMimt-rmiMff rri7fiuit'»'fiP9 a*?*
m itmmni<t4ht*fchK8i!SB= = > = >><>■•!i■!.«.».( ccm
MM t M ' H « M * If F«»m
ui’iii4MiMii»iMiMS?a*M»i.VM'****ifciMM<i-prfi'CR«feF«rwirrrf*
MIM1 { ( 1 ( ( m< M ■ ME Kill I* CM3*
rwuterrfirvffiaiiatiauMsi 11 m*m >t>i i >. i s * *>oF?Ftt mMHwin»naRR<**i!'
mii>iniiti11*tvi11pit f i i Miitrrmrmiunm
bfcttbtltJUMiLUM tlfttttl ttsc-ii I Ill'll ; ' l ! F,reK«B8I*f If
I I I'Ll i L I II ltFm'f r fH<M«l Kl.
|JhPHbH i I Ml I #11 MM IFfXfrxfwi n m 4 | 11 ! 11« « f t if f E-WHIM IS 1 f I * I »
I't't'tlt’l'tfCf IUHIJIJ 11 f f * M f f I > E f 1 f E18 f V If ff Cl Bill tb
'»»i iru 11mmium<mi»'m«'!
imiiimmii iHiniHiiimn
aajj iiuiimtmiijtnweifiifiaiiyi > ftBummuuiuu'i
mUmuntllHI till ME HE MM* 11 i MltllbH M MUtt ,1111 Mf IVH
min ii 11 n * m i til m m*i bKEEEMit't'H hmutmiMim himmuiiu
unt y«t>t’hl'Mt»hHitRrKKI’NBEI-’*H III I HI M-•»»»***« = • MUM 1 rt?f MM
tttfmjtctctttiMgiaBxaam «-»«_«»»»■■»»»»»»» » «.. »nsfs:ifvHi’Mcppna
Mil
.........M'lmiW'iirMti)
1114 111 li I HfltlMH) IDmmximi mixujaj i j 11 tit'll t'tl I mill
in 1 is mi •arirrrf rm i*mm 11 h i
ihhiiiiiiimmm(| ; , ..... III Ill'll imifaMf
*‘ f mi lilflllj’
H'Hiiiminiiiiniia)iiM-..i........
< n<!i!nmEf f tttf tmimctf it> 11 m• • - 1 ,.,. m M'EiirEMiii'mrisaun
rmummiMxii 11 mm m hi v»f i*f«f8fffxi*i:»»gi0B
<imifiMuiii'imHiiiimmnK,M-nvit k nHt.imm(rrr"r«i''tf
\$W
Kenneth Knowlton is a Bell Labs lifer.
Tall, patrician and gracious, his work, like
Sutherland’s, shows the inner light of unifying
intelligence. He works in Max Mathews' section
of Bell Labs at Murray Hill, where they do all
that interesting stuff with music and perceptual
psychology and so on. During the last decade,
Knowlton has turned out vast quantities of art¬
icles, processed pictures, movies, Bnd actual
computer languages; while any ordinary man
would be satisfied to be so productive, appar¬
ently he does a lot of other things in his work
that he doesn't talk about.
Some of Knowlton's best-known work
hos been in picture processing, where he has
converted photographs into mosaics of tiny
patterns-- which nevertheless show the original.
His first widely-known language was
BEFLIX (BE11 Labs movie-making system); this
was programmed for the 7094 in the early sixties.
BEFLIX allowed the user to create motion pictures
by a clever mosaic process that used the out¬
put camera more efficiently. (Actually . the lens
was thrown out of focus manually and the entire
frame created as a mosaic of alphabetical charac¬
ters; this did the whole thing much more Quickly
and inexpensively.)
(Some of the clever data-handling tech¬
niques of BEFLIX Knowlton then turned around
and used in L6, a language which made these
techniques available to other computer people.
This may sound like only a computer technicality,
but it’s the sort of thing that's widely appreciated.
(L6 stands for "belL Labs' Lower-Level List
Language."))
Wanting to get outside artists interested
in BEFLIX and related media, he worked for a time
with film-maker Stan Vanderbeek; from this
Knowlton saw that artists' needs were more
intricate than he had anticipated. Augmenting
BEFLIX with some of the things Vanderbeek
asked for, Knowlton came up with a new lan¬
guage called TARPS (Two-Dimensional Alpha-
Numeric Raster Picture System). This in turn
led to EXPLOR (Explicit(ly provided 2D Patterns,)
Local (neighborhood) Operations, and Random-'
ness). EXPLOR is fascinating because of its
originality and generality-- not only does it
modify pictures and serve as an artist's tool,
but it has fascinating properties as a computer
language and may even have applications in
complex simulations for technical purposes.
Since Vanderbeek, Knowlton has entered
into a long and fruitful collaboration with Lillian
Schwartz, a talented artist. Their many films
have been clever, startling and powerful. I
must say that they grow on you: I liked them at
first, but when I saw five or six in a row this
January, I found them just incredible. Because
they are abstract, and full of fast-changing
patterns and reversals, they take some adjusting
to; but they’re worth seeing over and over.
EXPLOR may be thought of as a highly
generalized version of Conway’s game of Life
(see p. HS )• Y °u start with two-dimensional
patterns as your data structure; these can be
abstractions or even converted photographs, as
in a recent Knowlton-Schwartz film showing
Muybridge's Running Man. In your EXPLOR
program, you may then cause the pattern to
change by degrees, each cell of the pattern
reacting to the cells around it or to random
events as specified by the programmer.
EXPLOR, running without external data,
comes up with some extraordinary snakeskin and
Jack Frost patterns. But its uses in traffic
simulation and various other studies of popu¬
lations in space could be very interesting.
EXPLOR has obvious artistic applications.
Lillian Schwartz is using it extensively in film-
making. It's now running on a minicomputer
feeding to a modified Sony Trinitron color TV.
(This color setup was created by Mike Noll
and is described in a recent issue of the CACM,
though only for black-and-white TV; the color
is more recent. It stores the color picture as
a list of sequential colors represented in the
computer's core memory, each dot being repre¬
sented Cf. "Boyell's T errarium," p. S h3^ .)
Knowlton has used EXPLOR for teaching
computer art at the University of California;
the language is available programmed in "medium
size" Fortran from Harry Huskey, Dept of
Information and Computer Science, U. of Cal.
at Santa Cruz, Santa Cruz, California.
DM 11
This is a non-dimple picture
conversion. The original
photograph was converted into
measured points; but these
were in turn made into grow—
together patterns by a
program in the EXPLOR language.
©Knowlton i Harmon.
SPEECH BY COMPUTER
(1 You “y have heard about various kinds of
talking computer." Thia deserves some explanation.
Computers may be made to "talk" by various
means. One Is through an output device that
simply stores recordings of separate
words or syllables, which the computer selects with
appropriate timing. (Machines of this type have been
sold by both IBM and Cognitronics for a Long time.)
A deeper approach is to have the computer synthe¬
size speech from phonemes, or actually make the tones
and noises of which speech is composed. These are
very tricky matters. Bell Labs, and others, have been
working on many of these approaches.
The real problem, of course, is how to decide
what to say . (This was discussed under Artificial
Intelligence, p. ^ )
AUDIO ANALYSIS AND ENHANCEMENT
The problem of analyzing audio is very like the
problem of analyzing pictures (see p . I 0 ) , and indeed
some of the same techniques are used. The audio goes
into the computer as a stream of measurements, and
the selfsame technique of Fourier Analysis is employed.
This reduces the audio to a series of frequency measure¬
ments over time— but, paradoxically, loses little of
the fidelity.
Once audio is reduced to Fourier patterns, it can
be reconstituted in various ways: changed in timing and
pitch independently, or enhanced by polishing techni¬
ques like those used in image enhancement (see p.$r*pO ).
This has been done with great success by Tom Stock-
ham at the University of Utah, who has reprocessed old
Caruso records into improved fidelity. In the picture
we see him with equipment of some sort and an old record.
Wish there were room to talk about plain
regular audio here— matters like "binaural"
recording, and Why don't they make hi-fi systems
based on a Grand Bus (see pM2 )? But there’s
no room here.
AUDIO AND COMPUTERS
People are occasionally still startled to
hear that computers can make sound and music.
They can indeed.
First of all, note that an incoming sound is
a fluctuating voltage and can thus be turned into
a data structure, i.e., a string of measurements.
In the easiest case, the computer can just
send back out the voltages it originally got in.
This is rather ridiculous— using the computer
just as a recording device— but it’s a clear and
simple example.
The question after that is what next : how to
have the computer make interesting streams^output
measurements, i.e., sounds and tones. "
To make sound by computer is the obverse. If
the computer can be Bet up to send out^ a string of
measurements, these can be turned back into a fluct¬
uating voltage, and thus make sounds.
There are numerous methods we can’t go into.
Max Mathews, at Bell Labs, has for years been doing
music by computer; his current system is called
GROOVE. Heinz von Foerster, at the University of
Illinois (Urbana), has been doing the same. An¬
other lab at MIT has just gotten a PDP-11/45 (see
p. WZ_) f° r the same purpose.
(The problem is: can the computer keep up
with the output rate needed to make music in real
time ? maybe the 11/45 can.)
Another approach is to relieve the computer
itself from making the tones, and use other de¬
vices— music synthesizers— for this, controlled
by the computer. This is essentially the approach
taken with General Turtle's Music Box (see p. ^7 )»
and at the Columbia-Princeton Electronic Music Cen¬
ter, where their RCA Mark XI music synthesizer— an
immense one-of-a-kind jobbie— is under more general
computer control.
MUSICAL NOTATION
note tnat
- computer nanrtllng of musical
notes, as symbols. Is another task entirely.
Closely resembling computer text handling (mention-
e variously in the book). A high-power structur-
ed-text system or Thinkertoy (see p.finRj) i s fine
tor storing and presenting written music.
, -■ scored musical notation
U data structure) can obviously be playe d by
the hookups mentioned. -—
University of Utah
(Stockham has been in the news lately, as one of
the panel puzzling over the notorious 18-Minute Gap.)
(The author has proposed the name Kitchensync tm
for a system to synchronize motion pictures with wild
sound recording by these means.)
BIBLIOGRAPHY
Thomas G. Stockham, Jr., "Restoration of Old Acoustic
Recordings by Means of Digital Signal Processing.
Audio Engineering Society preprint no. 831 (D-4),
presented at Audio Engineering Society 1971 con¬
vention .
’rentiss H. Knowlton, "Capture and Display of Keyboard
Music," Datamation May '72, 56-60. Describes a
setup he built at U. of Utah that allows pianists
to play music on an ordinary keyboard, and converts
the input to symbolic representation in the com¬
puter. It uses an organ, a PDP-8 and a couple of
CRT displays.
"^leinz^von Foers ter aflf Jd l bes Beaucha mp, Music bjr Computer*
Wiley, 1969. HAS RECORDS IN BACK.
Some of the early Bell Labs work may be heard on an
excellent Decca LP with the misleading title
"MUSIC from MATHEMATICS." (Decca DL 79103)■ (The
mathematical myth is discussed on p. a- 1 ).)
811
u 4 ( 4 l urn a>*nrrezj>K.eMS'.
5)r(*"»v 4 7C ftftk CT
7^ Itr 'fiKe for twe_
tHtce t* ke refUce<|
W'Tlv fte. CKit'C^I e*jp
These are three topics of great importance:
of importance, unfortunately, less for what they
have actually accomplished than for the degree
to which they have confused and intimidated peo¬
ple who want to understand what’s going on.
Merely to mention them can be one-upmanship.
All three titles mean so much, so many different
specific things, as to mean almost nothing when
lumped together as a whole. All three have de¬
veloped a web of intricate technical facts (and
sometimes theorems), but the applicability of
these elegant findings is in all three cases a
matter open to considerable scrutiny.
m CsPD'Buiur\eps /
"Artificial Intelligence" ia at once the sexiest
and moat ominous tens in the world. It chills and Im¬
presses at the same tine. In principle it means the
simulation of processes of mind, by any means at all;
but It generally turns out to be some form or another
of computer simulation (see "Simulation," p. <Tt ) •
Actually, "artificial Intelligence" has generally be¬
come an all-Inclualve term for systems that amaze, as¬
tound, mystify, and do not operate according to prin¬
ciples which can be easily explained. In a vay, "arti¬
ficial Intelligence" is an ever-receding frontier: as
techniques become well-worked out and understood, their
appearance of intelligence, to the sophisticated, con¬
tinually recedes. It's like the ocean: however much
you take out of it, it still stretches on— as limit¬
less as before.
Since each of these fields has developed
a considerable body of technical doctrine, the
reader might well ask: why aren't they on the
other side of the book, the computer side? The
answer is that they are computerman's dreams,
dreams of considerable intricacy and persuas¬
iveness. and we are not considering the tech¬
nicalities here anyway. As on the other side,
the problem is to help you distinguish opples
from oranges and which way is up. For more
go elsewhere, but 1 hope this orientation will
make sorting things out quicker for you.
These three terms-- "artificial intelligence,”
"information retrieval." "computer-assisted
instruction"-- have a number of things in com¬
mon. First, the names are so portentous and
formidable. Second, if you read or hear any¬
thing in these fields, chances are it will have
an air of unfathomable technicality. Both strange
technicalism and deep mathematics may combine
to give you a sense that you can't understand
any of it. This is wrong. The fact that there
are obscure and Deep Teachings in each haB no
bearing on the general comprehensibility of what
they are about. More importantly, the question
of how applicable all the things these people
have been doing is going (o be is a question
of considerable importance, especially when
some of these people want to take something over.
Don't get snowed.
Each of these fascinating terms is actually
a roof over a veritable 200 of different researchers,
often of the most eccentric and interesting sort,
each generally with his own dream of how his
own research will be the breakthrough for
humanity, or for something. It would take a
Lemuel Gulliver to to show you the colorfulness
and fascination of these fields; again, we just
scratch the surface here.
Another interesting thing these three fields
nave in common: the frequent use of a classical
computerman's putdown on anybody who dares
question whether their super-ultimate goals can
ever be achieved.
Unfortunately laymen are so Impressed by computers
in general that they easily suppose computers can do
anything involving information. And public understand¬
ing is not fostered by certain types of stupid demon¬
stration. One year I heard from numerous people about
how "they'd seen on TV about how computers write TV
scripts"— what had actually been shown was a hokey en¬
actment of how the computer could randomly decide whe¬
ther the Bad Man gets shot or the Cood Cuy gets shot—
both outcomes dutifully enacted by guys in cowboy out¬
fits. Duh.
It should be perfectly obvious to anybody who's
brushed even slightly with computers, however— for
The Brush, see the other side— that they just don't
work like minds. But the analogy hangs around. (Ed¬
mund C. Berkeley wrote a book in the forties, I believe,
with the misleading title of Giant Brains , or Machines
That Think . The idea is still around.)
Here's a very simple example, though. Consider
a maze drawn on a piece of paper. Just by looking, we
cannot simultaneously comprehend all its pathways; we
have to poke around on It to figure out the solution.
Computers are aort of like that, but more so. While our
eyes can take in a simple picture, like a square, at
once, the computer program must poke around in its data
representation at length to sec what we saw at once.
The principle holds true In general. The human
mind can do in a flash, all at once (or "in parallel")
many things that must be tediously checked and tried
by the highly sequential computer program. And the
more we know about computers, the more impressive the
human brain becomes. (The seeming cleverness of some
simple programs does not prove the simplicity of the
phenomena being Imitated.)
a
I
Nevertheless, It is interesting to try things
with computers that are more like what the mind does;
and that is mostly what artificial Intelligence Is
about.
In various cases this has resulted in helpful (
tricks that turn out to be uaeful elsewhere in the (.
computer field. In this sense, artificial intelligence
is sort of like menthol: a little may improve things J
here and there. But (in my opinion), that does not
mean a whole lot of it would make things better still.
Nevertheless, some artificial-intelligence en¬
thusiasts think there is no limit on what machines can
do. They point out that, after all, the brain is a
machine. But so is the universe, presumably; and
we're never going to build one of those, either.
What It bolls down to la the study of clusa and
guessing among alternatives . In some esses, well-
defined cluea can be found for recognizing epeclflc
thinge, like pert* of pictures (even straight lines
cennot be recognized by computer without a complex
program) or like handwriting (sec below). In the
worse cases, though, earefnl study only raises the
moat horrendous technical problems, and the pursuit
of these technical problems is Its own field of
study (articles have titles like "Sensitivity Pmrs-
meters in the Adjuetment of Discriminatorsmeaning
It Sure le Hard to Draw The Lina).
But in some felicitous cases, researchers ac¬
tually boil a recognition problem down to « manage¬
able system of clues. For Instance, take the prob¬
lem of written input to computers. (Some people
don't like to type and would rather write by hand
on apeclsl input tablete.) But how can a program
recognize the letters? Aha: ths answer, kids, is
in your text.
The Ledeen Character Recognizer (described in
detail in Newman and Sproull, Principles of Inter¬
active Computer Graphics , Appendix 8) is a method
by which a program can look at a hand-drawn charac¬
ter and try to recognize it. The program extract*
a series of "properties" for the character and
stores them in an array. Every character In a given
person's block lettering will tend to have certain
property scores. But the Ledeen recognizer must
still be trained , that is, the average property
scores of the letters that each individual draws
must be put into the system before that individual’s
lettering can be recognized. Even then it's a ques¬
tion of probability, rather than certainty, that
a given character will be recognized.
CpHfOTCBi !»MT ^CTOAUV
fCN Jurt THIS*. THfV THINK..
We tt.Hlr.)
HEURISTICS (pronounced hevRIStlcs)
If we want to make a computer do what we know
perfectly well how to do ourselves, then all we do
is write a program.
Aha. But what If we want a computer to do
something we do not know how to do ourselves?
We must set up its program to browse, and search,
and seize on what turns out to work.
This is called heuristics.
What It amounts to basically Is techniques for
trying things out, checking the results, and continu¬
ing to do more and more of what seems to work.
Or we could phrase It this way: looking for
successful strategies in whatever area we're dealing
with. As a heuristic program tries things out, it
keeps various scores of how well it's doing— a sort of
self-congratulation— and makes adjustment* in favor
of what works best.
Thus the Greenblatt Chess Program, mentioned un¬
der "Chesa," nearby, can "invent" chess strategies
and "try them out"— what it actually does is test
specific patterns of moves for the overall goodness
of their results (in terms of the usual positional
advantages In chess), and discard the strategies that
don't get anywhere. It does this by comparing its
"strategies" (possible move patterns) against the
record's of cheas matches which are fed into it.
ill
The line is, "WE DON'T KNOW HOW TO DO
THAT YET."
If somebody pulls it on you, the reply is
simply, "How do you know you ever will?"
Oieofttie^Gcoj)
ccwTeit jokes
illustrating also certain problems of Artificial
Intelligence.
A very large artificial-intelligence system
(goes the story) had been built for the military
to help in long-range policy planning; financed
by ARPA, with people from M.I.T., Stanford
and so on.
"The system ia now ready to answer ques¬
tions," a aid the spokesman for the project.
A four-star general bit off the end of a
cigar, looked whimsically at his comrades and
said—
"Aak the machine this: Will it be Peace
or War?"
The clerk-typist (Sp4) translated this
into the query language and typed it in.
The machine replied:
YES
"Yes what? " bellowed the general.
The operator typed in the query.
Came the anawer:
PATTERN RECOGNITION
This Is one of the most active areas In arti¬
ficial intelligence, perhaps because of Defense
Department money. (It might be nice, goes the
reasoning, to have guns that could recognize tanks,
machines that could look over aerial reconnaissance
pictures, radars that could recognize missiles...)
(If you’ve read the other side of the book,
heuristics may be thought of as a form of operations
research (p. S'? ) carried on by the computer Itself.)
In some vaya heuristics is the most magical area
of artificial intelligence: its results are the moat
impressive to laymen. But, like so many of the comput¬
er magics, it boils down to technicalities which lose
the romance to a certain extent.
Yes SIR
DM 13
neural simulation
An Important branch of Artificial Intelligence 1*
concerned with whet bunches of laaglnary neuron* could
do. even neuron* that we aade up to follow particular
rule*. This are* of study la soaevhsre between neurol¬
ogy and aatheaatlea: much of It Is concerned with the
aatheaatlea of Imaginary setups, rather than the proper¬
ties of actual nerve-neta, *■ studied by psychologist*,
physiologists and other*. (The hypothetical studies,
of course, elert researchers to complex configurations
and possibilities that may turn out to occur In reality,
as well as being interesting for their own sake— and
conceivably aa ueeful waya ol organising thlnga to be
built.)
However, an aarlter myth, that you could simulate
neurons till you got s person, 1* about dssd.
SIMULATION OF THOUGHT-PROCESSES
Nobody talka anymore about simulating artificial
brains; there’s too much to it, and it involve* dirty
approximation.
However, a cleaner area Is In the simulation of
thought: cresting computer programs that mimic man’s
mental processes as he dopes through various problems.
Trying things out, deducing thoughts from what's al¬
ready known, following through the consequences of
guesses— these can all be done by programs that “try
to figure out" answer* to problems like The Cannibal
and The Missionary, or whatever.
AUTOMATA
"Automata'',' a* the tern la used in thin field,
la just a fancy word for imaginary critters , parti¬
cularly little thingiea that behave In exact waya.
(The Came of Life, see p. f 8, is an automaton In
this sense.)
SELF-ORGANIZING SYSTEMS, SELF-REPRODUCING SYSTEMS,
AND SO PORTH
These are terms for Imaginary objects, having
exactly defined mathematical properties, about which
various abstract things can be proven that tend to be
of interest only to mathematicians.
SPEECH
1. SENTENCE GENERATION
The problem of computers speaking human languages—
not to be confused with computer languages, pp. 15-25 and
elsewhere— is incredibly explicated. Just because little
human tykes start doing It effortlessly. It Is easy to sup¬
pose that It's a basically easy problem.
No way.
Only since the mid-fifties has human language begun
to be understood. That was when Noam Chomsky discovered the
inner structure of human languages: namely, that the long
(and complex) sentence constructions of language are built
out of certain exact operations. Previous linguist* had
sought to classify the sentence structures themselves; this
led to complexities which Chomsky discovered were unneces¬
sary. It is unnecessary to catalog sentence types them¬
selves if we can simply Isolate, Instead, the exact process¬
es by which they are generated.
These processes he called transformations (a term he
borrowed from mathematics). All utterances are created from
certain elementary pieces, called kernels , which are then
chewed by transformations into surface structures . the
final utterances. Examples of kernels: The man lives in the
house, The house is white. Result of combining transforma¬
tion: The man lives in the white house. Kernel: 1 go.
Result of past-tense transformation: I went.
The moat important finding, now, is that the transfor¬
mations are carried out in orderly sequences : any sentences
can have more transformations carried out on it, all adher¬
ing to the basic rules, resulting in the most complex sen¬
tences of any language.
Linguists since then have confirmed Chomsky's con¬
jecture, and proceeded to work out the fundamental trans¬
formations of major languages, including English.
Now, one result of all this ia that it tuma out to
be easier to generate sentences in a language than to un¬
derstand them. Why? Because it is comparatively easy to
program computers to apply transformations to kernels,
BUT very hard to take apart the result. A complex "sur¬
face structure" may have numerous possible kernels— does
"Time flies like an arrow" have the same structure as
"Susie sings like s bird" or "Fruit files like an orange?"
Result: to program a computer to generate speech—
that ia, invent sentences about a data structure and type
them out— is comparatively easy, but to have it recognize
incoming sentences, and break them up into their kernel
meanings, la not.
We may think of a language-generating computer aya-
tem as follows:
rew-
roK-
Ti l
vciut gj
SENTENCE RECOGNITION
Chomsky and others have discovered that seta of trans¬
formation rules (or gtamarg . praise be) very considerably.
It is possible to invent languages whose surface structures
are easy to take apart, or parse : auch languages are called
context-free languages . (Most computer languages, see other
side, are of this type.) Unfortunately natursl languages,
like English and French and Navaho, are not context-free.
It turns out that the human brain can pick apart language
structuree because it's eo good at making sensible guesses
as to what it meant— and If there ie one thing hard to
program for computers, it is sensible guessing.
(But see "Heuristics," nearby.)
This means that to create computer systems which will
take real sentence* spart into their mesninge Is quite
difficult. We can't get into the various strategies here;
but moat researchers cut the problem down in one way or
other.
wo,d '
“ ^’^esponsjvc
I Fitted wuh our Specie! n i 7, ^ A N
' Thlnks ' S F“*». Acts, and iZa T Att * chm,n ’
55
o
z m a
f o
«I don't know,” answered Dorothy, who had
more to read. “Listen to this, Billina:”
DIRECTIONS FOR USING:
For THINKINGWind the Clock-work Man under his
left arm. (marked No. 1.)
For SPEAKING:—Wind the Clock-work Man under his
right arm, (marked No. 2.)
For WALKING and ACTION Wind Clock-work in the
middle of his back, (marked No. 3.)
K IV-ThM ■» 10 «o»k pmrUellj far « Ihcniund ywt.
“Well, I declare!” gasped the yellow hen, in
amazement; “if the copper man can do half of these
things he is a very wonderful machine. But I suppose
it isall humbug, like so many other patented articles."
“We might wind him up,” suggested Dorothy,
“and see what he'll do.”
GORDON PASiI
Gordon Pask is one of the maddest mad
scientists I have ever met, and also one of
the nicest. An eloquent English leprechaun
who dresses the Edwardian dandy, Pask sows
awe wherever he goes. A former doctor and
theatrical producer, Pask is one of the great
international fast-talkers, conference-hopping
round the globe from Utah to Washington to
his project at the Brooklyn Children's Museum.
This spring, 1974, he has been at the Univer¬
sity of Illinois at Chicago Circle, but soon
he goes back to England and his laboratory.
In a field full of brilliant eccentrics,
Pask has no difficulty standing out.
Pask is one of the Artificial Intelli¬
gencers who is working on teaching by compu¬
ter, about which more will be said; but the
original core of his interest is perhaps the
process of conceptualization and abstraction.
Pask has done a good deal on the mathe¬
matics of self-contemplating systems, that is,
symbolic representations of what it means for
a creature (or entity omega ) to look at things,
see that they are alike, and divine abstract
conceptions of them. A crowning moment is
when Omega beholds itself and recognizes the
continuity and selfhood. (Pask says several
others-- scholars from Argentina, Russia and
elsewhere-- have hit on the same formulation.)
Models and abstraction, then, are what we
may call the first half of Pask's work.
Gordon Paak uill be continued on p. iM7-
3. SPEECH OUTPUT AS SOUND
It it possible in principle to sat up computers to
"talk" by converting ths language surface structures that
their program corn up with Into actual sound. See
"Audio," p. DH IA.
4. SPEECH INPUT TO COMPUTERS BY ACTUAL SOUND
So far we hava baen talking about ths computer's aanl-
pulatlon of language aa an alphabetical coding or similar
repreaentatlon. To actually talk at a computer 1a another
kettle of flah. Thle means breaking down the aound Into
phonenea and then breaking it into a data atructurc which
can be treated with the rulee of gramar— a whole nothar
difficult step.
A few attempts have been mad# to market dsvlcea which
would recognize Halted speech and convert It to symbol■ to
go Into the computer. One of thea, which supposedly can
distinguish among thirty or forty different spoken words,
la supposedly atlll on the aarket. Specific users hava to
"train" It to the particulars of their voices.
I repeatedly hear rumors of "dictation Machines" which
will type what you say to them. If auch things exist I have
been unable to confirm It.
(Everybody says that of course what we vent la to be
able to cooBunlcate with coaputers by speech. Speaking
personally, I certainly don't. Explaining my punctuation
to human secretaries la hard enough, let alone trying to
tell It to a coisputer, when It's easy enough to type It in.)
5. - ALL TOGETHER NOW
The complexity of the problem should by now be clear.
"nifcrtf<r
CYBERNETICS
Gordon Pask calls his field Cybernetics.
The term "cybernetics" is heard a lot, and is
one of those terms which, in the main, mankind
would be better off without; although after
talking to Pask I get the sense that there may
be something to it after all.
The term "cybernetics" was coined by Nor-
bert Wiener, the famously absent-minded math¬
ematician who (according to legend) often
failed to recognize his own children.' Wiener
did pioneering work in a number of areas. A
special concern of his was the study of things
which are kept in control by corrective meas¬
ures, or, as he called it. Feedback . The term
"cybernetics" he made out of a Greek word
for steersman , applying it to all processes
which involve corrective control. It turns
out that almost everything involves corrective
control, so the term "cybernetics" spreads out
as far and as thinly as you could possibly want
(The public is under the general impression
that "cybernetics" refers to computers, and
the computer people should be called "cyber¬
neticians." There seems to be nothing that
can be done about this. See "cybercrud
p. g . This is an even worse term meaning
"steering people into crud," specifically,
putting things over on people using computers.)
Properly, the core of "cybernetics ' seems
to deal with control linkages , whether in
automobiles, cockroaches or computers. How¬
ever, people like Pask, von Foerster, Ashby
(and so on) appear to extend the concept gen¬
erally to the study of forms of behavior and
adaptation considered in the abstract. The
validity and fascination of this work, of
course, is quite unrelated to what you call it.
THE TURING MACHINE
Is the most classical abstract Automaton.
A Turing Machine, named after Us discoverer,
is a hypothetical device which has an lnfin~
Ite recording tape that It can move back and
forth, and the ability to make decisions de¬
pending on what's written there.
Turing proceeded to point out that no
matter how fast you go step-by-step, you can t
ever outrun certain restrictions built Into
all sequential processes as represented by
the Turing Machine. This lays heavy limits
on what can ever be done step-by-step by
computer. (It means we have to look for
911
CAM A COMPUTER PLAY CHESS?
THE THREE LAWS OF RO 8 OTTC 8
DO WE MAST TALKtMC SYSTEMS?
I had one quite Irritating experience with a
"convereetlonal 1 system, that le. computer program
that was euppoeed to talk back to we. I waa aup-
poeed to type to It In English and It waa supposedly
going to type back to me In English. I found the ex¬
perience thoroughly Irritating. My side of the con-
yereatlon, which 1 sincerely tried to keep simple,
produced repeated apologise and confusion from the
program. The guy who’d created the program kept ex¬
plaining that the program would be improved, so
that eventually It could handle responses like mine.
My reset Ion wee, end Is, Who needs It?
Many people In the computer field seem to think
we went to be eble to talk to computer* and have them
talk back to ue. Thle la by oo means a settled matter.
Talking programs are complicated and require »
lot of space in the machine, and (more importantly)
require a lot of time by progrsmer. who could achieve
(1 think) more in leas tlms by other means. Moreover,
talking programs produce an Irritating strategical
paradox. In dealing with human beings, we know what
we're dealing with, and can adjust what we say accord¬
ingly; there la no waj to tell , except by a lot of ex¬
perimenting, what the principles are Inside a particu¬
lar talking program; so that trying to adjust to It
la a strain and an Irritation. (Compare; talking to a
stranger who may or -ay not turn out to be your new boas.)
Now, some ptogramer* keep saying that eventually they 11
have it acting Juat as smart as a real person, so we needn’t
adjust; but that'* ridlculoua. We alw«y* adju*t to real
people. In other words, the human discomfort and Irrita¬
tion Of p»ychlng the system gut can never be eliminated.
Furthermore, on today's sequential equipment and
with feasible budgets, I personally think ths likelihood
of making programs that are really general talkers 1* a
foolish goal. There are many simpler ways of telling
computer systems what you want to tell them— light pen
choice, for example.
Moreover, having to type in whole English phraaes
can be Irritating. (We can't even get into the problem
of having the computer pick epart the audio If you talk
it In.)
This la not to say understandably re»trlcted talking
systems are bad. If you know and understand the sorts of
response the system makes to what kinds of thing, then an
Engllah-Uke response 1* really a clear message. For in¬
stance, the JOSS syatem (the first Quickie language-
see p. IS) had an eloquent message;
eh?
which actually meant. What you have Juet typed In doea not
fit the rules of acceptable Input for this system . But It
waa short, It was quick, it was simple, and It was almost
polite.
Similarly, talking systems that uaa an exact vocabu¬
lary, whose limits and abilities sre known to the person,
arc okay. (Wlnograd, see Bibliography, has a nice example
of telling a computer to stack blocks, where the system
knows words like between, on, above and so on.) Where
this is understood by the human, It can be a genuine con¬
venience rather than a spurious one.
(The problem of rudeness in computer dialogue has not
been much discussed. This is partly because many program¬
mers are not fully aware of it, or. Indeed, some are so
skilled in certain subtle forms of rudeness they wouldn't
even know they weren't acceptable. The result is that cer¬
tain types of putdown, poke, peremptoriness and lmportunacy
can find their way Into computer dialogue all too easily.
Or, to put it another way: nobody like to be talked back to.
Cf. Those stupid green THANK YOU lights on automatic toll
booths.)
Now, this Is not to aay that research in these areas
Is wrong, or even that researchers' hopes of some break¬
through In talking-systems Is misguided. I am saying,
basically, that talking systems cannot be taken for grant¬
ed aa the proper goal In computer# to be uaed by people;
that the problems of rudeness, and Irritating the human
user, arc far greater than many of these researchers sup¬
pose; and that there may be alternatives to thia potential¬
ly eternal leprechaun-chasing.
If like the author you are bemused by the great
difficulty of getting along with human beings, then the
creation of extraneous beings of impenetrable character
with vaguely human qualities can only alarm you, and
the prospect of these additional crypto-entitlea which
** 8t be fended and placated, clawing at ue from their
niches at every turn. Is both distasteful and alarming.
Artificial Intelligence enthusiasts unfortunately
tend to have a magician's outlook: to make clear how
their things work would spoil the show.
Thus, for a rather peculiar art show held at New
York's Jewish Museum in 1970, a group from MIT built a
large device that stacked blocks under control of a
minicomputer (Interdata brand). Now. the fact that it
could stack and re-stack blocks with just a minicomputer
was really quite an aeccupiiahment, but this was not
explained.
instead, the block-stacking mechanism was enclosed
in a large glass pen, in which numerous gerbils— hoppy
little rodents— were free to wander about. When a ger-
bil saw that a block was about to be stacked on him, he
would sensibly move.
Now, it is fairly humorous, and not cruel, to put
gerbils into a block-stacking machine. But this was
offered to the public as a device partaking of a far more
global mission, the experimental interaction of living
creatures and a dynamic self-improving environment,
blah blah blah.
Passersby were awed. 'Why are those animals in
there?" one would say, and the more informed one would
usually say, "It's some kind of scientific experiment."
Well, this is e twilight area, between science and
whimsical hokum, but one cannot help wishing simple and
humorous things could be presented with their simplicity
and humor laid bare.
I remember watching one gerbil who stood motionless
on hie little kangaroo matchetick legs, watching the Great
Grappler rearranging his world. Gerbils are somewhat in¬
scrutable, but I had a sense that he was worshiping it.
He did not move until the block started coming down on top
I take this as an allegory.
2IT
The reel question is, can s aet of procedures
play chess? Because that's what the computer pro¬
gram really doea, enact a aet of procedures.
1-- A robot may not injure a human being, or,
through inaction, allow a humsn being to come
to harm.
And ths answer Is yea, fairly well.
Now, a chess program Is not something you Jot
down on the back of an envelope one afternoon. It's
usually an lmense, convoluted thing that people have
worked on for yeara. (Although I vaguely recall that
second place In the 1970 Inter-computer chess contest
was won by a program that occupied only 2000 locations
In a 16-blt minicomputer— In other words, a compact
and tricky sneaker.)
Now, simple games (liks tlc-tac-toe and Nln and
even Cubic) can be worked out all the way: all alter¬
natives can be examined by the program and the beat
one found. Not so with chess.
Chets basically Involves, because of Its very
many possibilities, a "combinatorial explosion" of
alternatives (see p. HJ); that is, to look at "all"
the possibilities of a midgame would take forever
(perhaps literally— the Turing problem), and thus
means must be found for discarding tome possibilities.
1-- A robot must obey the orders given it by
humsn beings except where such orders would
conflict with the First Law.
3- A robot must protset Its own existence as
long as such protection does not conflict with
the First or Second Law.
- Handbook of Robotics .
56th Edition, 2058 A.D.,
quoted in I. Asimov, 1. Robot .
.S rr ,1qi. ( Ta,K
wilt see vou
(What the ELIZA program types, we represent as all caps:
what the person types la not.)
The structure of branching poaslbllltiea la a
tree (sea p. 2 £> > l 80 that method* of "pruning" the
tree turn out to be crucial.
Baaically there are two approachea to the design
of cheas programs. In one approach, the programmers
look for specific threats and opportunities In the
data structure representing the board, and try to find
good atrategles for selecting good moves on the basis
of then. This Is the approach taken In COKO, the
"Cooper-Kor"chess program. The programmers selectively
cope with individual problems and strategies as they
turn out to be necessary. (This means that It Is
likely to have specific Achilles’ heels; which, of
course, the authors of the program keep trying to re¬
pair by adding specific corrections.)
A different approach is taken by the Creenblatt
cheas program. This la basically a big Heuristic prog¬
ram. It "learns" best atrategles In chess by "watching"
the game. That Is, your pour historical cheas matches
through It, and It tries out strategies— making various
tentative rules about what kinds of moves are good, then
scoring these moves according to the results of malting
them— aa seen in positional advantages Chat resulted In
actuelly championship play.
Obviously thle is s field In Itself. You won't get
grants for It, but to those who really care about both
chess and computers. It's the only thing to be doing.
FRANKENSTEIN MEETS CYBERCRUD
Fred Brooks, the keynote speaker at the IEEE com¬
puter conference in Fall 74, seem* to have said that
HAL 9000 (the unctuous, traitorous Presence in the
movie 2001 ) was the way computers should be. ( Computer
Decisions . Apr 74, 4.)
PLEASE TELL HE YOUR PROBLEM.
1 am feeling depressed.
HOW LONG HAVE YOU BEEN FEELING DEPRESSED?
Ever since ay mother left.
TELL ME MORE ABOUT YOUR FAMILY.
My father is very strict.
PLEASE GO ON.
Last night I dreamt he spanked me.
WHAT WOULD IT MEAN TO YOU IF HE SPANKED YOU?
Didn't yod ever get epanked?
WE WERE DISCUSSING YOU, NOT ME.
You're Juat a dumb machine anyway.
DO COMPUTERS FRIGHTEN YOU?
(quoted in Wlnograd, 74-5)
The fascinating thing about the ELIZA program 1*
that it seems so like a real person— that is, a psycho¬
analyst of the nondirective, Carl Rogers school.
But all it is is a bag of tricks.
It ha* a lot of canned phraaes it can throw out,
like PLEASE TELL ME YOUR PROBLEM.
Then it spots certain types of sentences and turns
them around. If the person types a sentence beginning with
"I am...", the ELIZA program turns it around with HOW LONG
HAVE YOUR BEEN. . . ?
And it looks for specific words which indicate a sen¬
tence can be turned around for a convincing result. For in¬
stance, if the person uses the word "everyone," the program
simply replies, WHO IN PARTICULAR CAN YOU THINK OF?
And certain highly-charged words are signals to throw in
a singer, regardless of what the user may have said. Por in¬
stance, If the person uses the word "mother," the machine
replies:
I find it hard to believe that anybody could think
that. Nevertheless, there are those artificial-intelli¬
gence freaks whose view it is that the purpose of all
this Is eventually (a) to create servants that will read
our minds and do our bidding, (b) servants who will take
things over and will Implement human morality, regardless
of our bidding (though we humans are tex frail to do so—
as in Asimov's I, Robot); or even (c) create masters who
will take everything over and run everything according to
their own principles and the hell with us. (I met a man
In s bar, after an ACM meeting, who claimed to believe
this was the purpose of It all: to create the master race
that would replace ua.)
TELL ME ABOUT YOUR FAMILY.
Now, do not be fooled. There ie no Ghost In the
Machine. The program does not "understand" the user.
THE PROGRAM IS MERELY ACTING OUT THE BAG OF TRICKS THAT
JOE WEIZENHAUH THOUGHT UP. Credit where credit Is due:
not to The Computer's Omniscience, but to Weizenbaum's
cleverness.
(Look at ths above sample dialogue and see if you
guess what tricks the program was using.)
The thing is, many people refuse to believe that It's
a program. Even when the program's tricks are explained.
According to Arthur C. Clarke's retroactive novel
2001: A Space Odyssey (Signet, 1968, 95f). the HAL 9000
computer series began as follows:
"In the 1980s, Minsky and Good had shown how neural
networks could be generated automatically-- self-
replicated-- in accordance with any arbitrary
learning pattern. Artificial brains could be grown
by a process strikingly analogous to the development
of the human brain." (P, 96.)
I don't know who Good is, but these are among the lines
Minsky has been working along for years, so I hope he’s
encouraged by the news of what he's going to accomplish.
Possible answer *1. It is rumored that Clarke's
retro-novel was Clarke 1 * rebuttal to Kubrick's final film,
And even some who underatand ELIZA like to call it up
from their terminal* for companionship, now and then.
BIBLIOGRAPHY
Terry Wlnograd, "When Will Computers Understand People?"
Psychology Today May 74, 73-9.
(Weizenbaum'i full article on ELIZA appeared in the
Comaninicationa of the ACM aometime in the mid or
late sixties: a flowchart revealed ita major trick*.
I have strong hunches about the inner work¬
ings of rnen who get millions of dollars from the
Department of Defense and then soy in private
that really they're going to use it to create a
machine so intelligent it can play with their chil¬
dren. (Not to name names or anything.) An
obvious question is. do they play with their
children? No, they play with computers.
Anyhow, so okay they grow the UAL 9000 in a tank.
Then how come in the Death-of-Hal scene we see Keir Dullea
bobbing around loosening circuit cards, just as if it
were a plain old 1978 computer?
Possible answer »2. HAL's tanks of neural glop are
controlled by PDP-lls, one to a card.
(Of course, if you take the letters after H, A and L
in the alphabet, you get I, B and M. So maybe those are 1130s.)
But the point here is not to hassle the
dreamers, just to sort out the dreams and put
them on hangers so you can try them on, and
maybe choose an ensemble for yourself.
DEUS EX MACHINA
Obviously such beliefs are outside the realm of
jclence or engineering. They belong to pure speculation;
and while various mechanisms have in fact been programed
to croak, stagger, stack blocks, compose sentences and so
on, to suppose that we are in any real sense anywhere near
mimicking human Intelligence, let alone surpassing and
superseding It, is either to be totally fooled or to hanker
after some curious dream from inside yourself.
As we said on the other side of the book, everybody in
computers has deeper motivations and Interior twists that
form his own special ties to these machines; and when It
cornea to our choices of fantasy machines, obviously an even
deeper level of psychic imprint la projecting Itself into
the world.
.. .EX MENS A
People who fantasize about wondrous creatures and deities they
want to make out of the computer obviously have something in¬
teresting in their own heads from which that comes. Perhaps
it comes from a desire for imaginary playmates, or an ambi¬
valence toward authority, or goodness knows what; there are so
many odd people at different ends of Artificial Intelligence
that there may be a lot of different psychological systems
at work. Or maybe artificial intelligence is Just where the
■ost brilliant, determined and eccentric dreamers go. Anyway,
1 can only ask the cueation, not give the answer.
BIBLIOGRAPHY
Terry Wlnograd, "When Will Computers Understand People?"
Psychology Today May 74, 73-79.
Particularly readable article.
Nicholas Negroponte, The Architecture Machine . MIT Press.
Takes the view that computera ahould be made into
magical servant# which not only handle bothersome
details, but more or less read our minds as well.
Leonard Uhr, Pattern Recognition , Learning and Thought ;
Computer-Programed Models ot Higher Mental Pro-
esses. Prentice-Hall.
Arthur W. Holt, "Algorithm for a Low Cost Hand Print
Reader." Computer Design Feb 74, 85-89,
Edward A. Felgenbaum and Julian Feldman (eda.),
Computers and Thought . McCraw-Hlll.
Old but still good for orientation.
A journal: Artificial Intelligence (North-Holland
Publishing Co., Journal Division; P.0. Box 211,
Amsterdam, The Netherlands. Was $26.50 s year in 1973.
This’ll show you what they’re thinking about now.
Roger Lind, "The Robots Are Coming, The Robots Are
Coming." Oul . Feb 1974.
Typical layman's hype. You don't get told until the
second page that a typical Industrial "robot" Is a
huge mechanism with one grappling arm.
Edward W. Kozdrowicki and Dennis W. Cooper, "COKO III:
the Cooper-Koz Chess Program." CACM July 73, 411-427.
Creenblatt, R.D., Eaetlake, D.E., and Crocker, S.D., "The
Creenblatt Chess Program." Proc FJCC 67, 801-810.
R.C. Garni11, "An Examination of Tlc-Tac-Toe-like Games."
Proc. NCC 74. 349-355.
t *wr
Mml ecretevML
"Infontition Retrieval" ia one of thoae terms
that laymen throw around aa If It were a manhole
cover. It aounda aa though It means bo much, ao very-
much. And ao you actually hear people aay thlnga like!
"But that would mean... (pregnant pauae) ... Informa¬
tion Retrieval!.'!" Similarly, aome of the hokey new
copyright notlcea you eee In booke from With-It publlah-
era intone that aald books may not be "placet in any In¬
formation retrieval system..." I take this to mean
that the publlahere are forbidding you to put the book
on a bookshelf, because "Information retrieval" almply
means any way at all of getting back information from
anything. A bookehelf, alnce it allowa you to read the
splnea of the booke, la indeed an Information Retrieval
Syatem.
It happena, incidentally, that the phrase "informa¬
tion retrieval" was coined in the forties by Calvin Mooers,
Inventor of TRACt" Language (see pp. 18-21). (If Wiener
had coined it he might have called it Getback. If Diebold
had coined It It might have been Thoughtomation.)
Anyhow, numeroua entirely different thlngB go on in
the field, all under the name of Information Retrieval.
1. Mon-computer retrieval . (See Becker and Hayes,
Automatic Information Retrieval .) These things are kind
of old-fashioned fun— cards with holes punched along the
edge, for instance,that you sort with knitting needles,
or the more recent systems with holes drilled In plastic
cards. Trouble is, of course, that computers are becoming
much more convenient and even less expensive than these,
counting your own time as being worth something.
2. Document Retrieval . Thla basically is an approach
that glorifies the old library card file, except now the
stuff la stored In computer* rather than on cards. But
what's stored is still the name of the document, who wrote
It, where It was published and so on. Obviously helpful
to librarians, but scarcely exciting.
3. Automatic document Indexing. Some organizations
find It helpful to have a computer try to figure out what
a book Is about, rather than have a person look at It and
check. (I don't see why this eaves anything, but there you
are.) Anyway, the text of the document (or selected perts)
are poured through a computer program that selects, for in¬
stance, keywords , that is, the most Important words In It,
or rather words the program thinks are most important. Then
theae keywords can go on the headings of library file cards,
or whatever.
There are various related systems by which people
study, for Instance, the citations between articles, but
we won't get Into that.
4. Content retrieval . Mow we’re getting to the sexy
atuff. A system for content retrieval is one thst somehow
stores Information in a computer and lets you get It back
The trick on both counts Is of course how.
Well, as we said on the other side of the book, any
Information stored in a computer has a data structure ,
which simply means whatever arrangement of alphabetical
characters, numbers and special codes the computer happens
to be saving.
In a content-retrieval system. Information on some
subject is somehow jaimed into a data structure— possibly
even by human coders— and then set up so people can get
It back out again In some way . Lot of possibilities here,
get it?
V ' ' ' ’
In the most startling of these systems, the QAS, or
"QuestIon-Answering System," some sort of dialogue program
(see "Artificial Intelligence," nearby) tries to give you
answers about the data structure. But this means there
have to be a whole lot of programs:
Theae eyatems can be quite startling In the way
they seem to understand you (aee Licklider book; also
Winograd piece under Artificial Intelligence). But they
don_t understand you. They are just poor dumb programs.
Many people (Including Licklider) seem to see in
.Questlon-Anawerlng-System* the wave of the future.
Others, HR* this author, are skeptical. It'a one thlni
u ° t !?““ th * t can deduce that Green's House la
til * “ OUa * fro " a bunch of ln P“t sentences on
the subject, but the question of how much theae can be
Improved la In some doubt. A eyetem that can answer thi
question, Vhat did Hegel say about determinism?" is
Some ways away, to put it mildly.
Then there Is the matter of consistency. The really
Interesting subjects are the ones where different authors
clslm opposing facts to support opposite conclusions.
In other words, there Is inconsistency within the content
of the field. In this case such systems are going to have
a problem. (See "Rasho-Mon Principle" under "Tissue of
Thought," 1
Another fundamental point Is this. It may be easy
enough to program a system to answer the question,
MsrwcnMl
Like Artificial Intelligence and Information Ret¬
rieval, Computer-Assisted Instruction sound* Ilk* some¬
thing exact snd impressive but Is In fsct a scattering of
technique, tied together only nominally by a general Ides.
Teaching. That would immediately allow you to aek, should
computer teaching uee dialogues? But they don't want‘you
to aek that.
In the claeelc formulation of the ssrly sixties, there
were going to be three levels of CAT: "drill-and-prectlce"
systems, much like teaching machines, thst simply helped
students practice various skills; a middle level (often
Itself called, confusingly, "computer-assisted instruction")}
and a third level, the Socratlc system, which would supposedly
be Ideal. Students studying on Socratlc systems would be
eloquently end thoughtfully Instructed and corrected by a
perfect being in the machine. "We don't know how to do that
yet," the people keep eaylng. Yet, indeed.
(My personal view on this subject, expressed In an article
(following) is that Computer-Assisted Instruction in many
way* extendo the worst features of education as we now know it
Into the new realm of presentation by computer.)
J)ots Trte Nfme paviov
This Is a true story. (The details are approx¬
imate.) It may provide certain insights.
An Assistant Commissioner of Education was
being shown a CAI system by representatives of a
large and well-known computer company.
One one side of the Commissioner stood a sales¬
man, who wanted him to be impressed. On the other
side stood one Dr. S., who knew how the system
worked.
The terminal, demonstrating a history program
that had hurriedly been put together, typed: WHO
CAPTURED FORT TICONOEROGA?
WHAT TIME DOES THE NEXT PLANE LEAVE FOR LACUARDIA?
but it Is a lot simpler to^diaplay schedules your eye can
run down, or allow you to go look at aome kind of graphic
display.
"Can I type anything?" asked the Assistant
Conmissioner.
"Sure," said the salesman, ignoring the frantic
head-shaking of Dr. S.
Speaking personally, I don't like talking to machines
and 1 don't like their talking back to me. I'm not saying
you have to agree, I'm just telling you you're allowed to
feel chat way.
5. Screen smmarle* . Theae systems let you sit at
a computer display screen and read summaries of various
things, as well as run through them with various programs
to look for keywords. (The New York Times now offers such
a system, costing over a thousand dollars a month to sub¬
scribers.)
The Assistant Commissioner typed: Gypsy Rose
Lee.
The machine replied:
NO, BUT YOU'RE CLOSE. HE CAPTURED QUEBEC A
SHORT TIHE LATER.
The Assistant Commissioner evidently enlivened
many a luncheon with that one, and Computer-Assisted
Instruction was effectively dead for the rest of the
admin 1stration.
6. " Full-text systems ." These are systems that
one way or another allow you to read all the text of
something from a computer display screen. There are
those of us who see these as the wave of the future,
but many others are perfectly outraged at the thought.
( Hypertext systems, now, are setups that allow you to
read Interconnected texts from computer display screens.
See PP>T/-7.;
This has been brief and has skipped a lot. Anyway,
as you see,IR Is no one thing.
BIBLIOGRAPHY
Vannevar Bush, "As We May Think." Atlantic Monthly .
July 1945, 101-108.
Theodor H. Nelson, "As We Will Think." Proc. Online 72
Conference, Brunei U. Uxbridge, England.
G. Salton, "Recent Studies In Automatic Text Analysis
and Document Retrieval." JACM, Apr 73, 258-278.
Donald E. Walker (ed.), Interactive Bibliographic Search :
The User/Computer Interface . AFIPS Press, $15.
Theodor H. Nelson, "Getting It Out of Our System." In
Schechter (ed.). Critique of Information Retrieval
(Thompson Books, 1947).
J.C.R. Licklider, Libraries of the Future . MIT Press,
1965. Clear and readable summary of the rest of the
field; then he goes on to advocate "procognitlve
systems," systems that will digest what's known In
any field and talk back to you, using techniques
of artificial Intelligence.
Whatever Its other merits, this book Is great
for shaking people up, especially librarians. It
seems so official.
Richard M. Laska, "All the Neva That's Fit to Retrieve."
Computer Decisions . Aug 72, pp. 18-22.
x. " Foil dAv
6
5MU.T (wiliMuta)
Text- i.
I PR.IS6HT AfOWAL
I sftttr M!ov,
uS«,
bsvttcrtj) at
I GttAt
( 1>n<L "Sit*
Stx D* SH
SOCRATI6
fySTE*’
•j) ofcx.
•f * h-.
ft*.
ft*. ofev " ?)
ANOTHER ANECDOTE
It Is a truism that Mendel's theories of
genetics got "lost" after publication in
1865, to be rediscovered in 1900. "If
only there had been proper information
retrieval under the right categories,"
people often say. Recent studies indi¬
cate that the publication containing
Mendel's paper reached, or got nearly to,
"practically all prominent biologists of
the mid-nineteenth century." ( Scientific
American , July 68, 55.)
i take this as suggesting that the prob¬
lem isn't categorical retrieval at ail.
It's mu 111-connected availability (see
"hypertext,"
Socoe of us have been saying for a long time
that learning from computers ought to be
under control of the student.
One group (never mind who) has taken hold
of this idea and gotten a lot of funding
for it under the name of STUDENT CONTROL.
This group talks as if it were some kind of
scientific breakthrough.
A friend of mine suggests, however, thst
this phrase may have brought the funding
because administrators thought it meant
control o£ the student.
BIBLIOGRAPHY
George B. Leonard, Education and Ecstasy .
Dell, $2.25. Argues for making
education an enthusiastic process,
Theodor H. Nelson, "No More Teachers'
Dirty Looks." Follows.
kit
(The following article appeared in the September. 1970 issue of Computer Decisio ns,
and got an extraordinary amount of attention. I have changed my views somewhat —
we all go through changes, after all-- but after consideration have decided to re-run
it in the original form, without qualifications, mollifications or anything, for its unity.
Thanks to Computer Deci sions for use of the artwork by Gans and for the Superstudent
picture on the cover, whose artist unfortunately insists on preserving his anonymity.
by Theodor H. Nelson
The Nelson Organization
New York
Did you find school dismal and dreary?
Did it turn you off?
Here the author proposes safe and legal
ways to turn kids on.
Some think the educational system is basically
all right, and more resources would get it working
again. Schools would do things the same way. ex¬
cept more so, and things would get better.
In that case the obvious question would be. how
can computers help? How can computers usefully
supplement and extend the traditional and accept¬
ed forms of teaching? This is the question to which
present-day efforts in “computer-assisted instruc¬
tion” — called CAI — seem to respond.
But such an approach is of no possible interest
to the new generation of critics of our school sys¬
tem — people like John Holt (Why Children Fail ),
Jonathan Kozol {Death at an Early Age) and
James Herndon (The Way It Spozed To Be). More
and more, such people are severely questioning the
genera! framework and structure of the way we
teach.
These writers describe particularly ghastly
examples of our schooling conditions. But such
horror stories aside, we are coming to recognize
that schools as we know them appear designed^#^
every level to sabotage the supposed goals of edu¬
cation. A child arrives at school bright and early
in his life. By drabness we deprive him of interests.
By fixed curriculum and sequence we rob him of
his orientation, initiative and motivation, and by
testing and scoring we subvert his natural intelli¬
gence.
Schools as we know them all run on the same
principles: iron all subjects flat and then proceed,
in groups, at a forced march across the flattened
plain. Material is dumped on the students and their
responses calibrated; their interaction and involve¬
ment with the material is not encouraged nor taken
into consideration, but their dutifulness of response
is carefully monitored.
While an exact arrangement of intended motiva¬
tions for the student is preset within the system,
they do not usually take effect according to the
ideal. It is not that students are /mmotivated, but
motivated askew. Rather than seek to achieve in
the way they are supposed to, students turn to
churlishness, surliness, or intellectual sheepishness.
A general human motivation is god-given at the
beginning and warped or destroyed by the edu¬
cational process as we know it; thus we internalize
at last that most fundamental of grownup goals:
just to get through another day.
Because of this procedure our very notion of
human ability has suffered. Adult mentality is
(JoMoef-fEACh
WM
W VI
An interesting point, incidentally, is that people read this a lot of different ways.
One Dean of Education hilariously misread it as an across the board plug for CAI.
Others read in it various forms of menace or advocacy of generalized mechanization.
One letter-writer said I was a menace but at least writing articles kept me off the
streets. Here is my fundamental point: computer assiste d instruction , applied thought¬
lessly and imitatively , threatens to extend the worst features of education as it now .
L cauterized. and we call it "normal.” Most people's
minds are mostly turned off most of the time. We
know virtually nothing of human abilities except
as they have been pickled and boxed in schools; we
need to ignore all that and start fresh. To want stu¬
dents to be "normal” is criminal, when we are all
so far below our potential. Buckminster Fuller, in
/ Seem To Be A Verb, says we are all born ge¬
niuses: Sylvia Ashton-Warner tells us in Teacher
of her success with this premise, and of the bril-
» liance and creative potential she was able to find in
j all her schoolchildren.
Curricula themselves destructively arrange the
study situation. By walls between artificially segre¬
gated "studies” and "separate topics” we forbid the
pursuit of interest and kill motivation.
| In ordinary schooling, the victim cannot orient
j himself to the current topic except by understand-
gftUety iooK*
ing the official angle of approach and presenta¬
tion. Though tie-ins to previous interests and
knowledge are usually the best way to get an initial
sense of a thing, there is only time to consider the
officially presented tie-ins. (Neither is there time
to answer questions, except briefly and rarely well
— and usually in a way that promotes "order” by
discouraging "extraneous” tie-ins from coming up.)
The unnecessary division and walling of sub¬
jects, sequencing and kibbling of material lead peo¬
ple to expect simplifications, to feel that naming a
thing is understanding it, to fear complex wholes;
to believe creativity means recombination, the
parsing of old relations, rather than synthesis.
Like political boundaries, curriculum boundar¬
ies arise from noticeable features of a continuum
and become progressively more fortified. As be¬
hind political borders, social unification occurs
within them, so that wholly dissimilar practitioners
who share a name come to think they do the same
thing. And because they talk mainly to each other,
they forget how near is the other side of the border.
Because of the fiction of "subjects,” great con¬
cern and consideration has always gone into cal¬
culating the "correct” teaching sequence for each
"subject.” In recent years radical new teaching se¬
quences have been introduced for teaching various
subjects, including mathematics and physics. But
such efforts appear to have been misinformed by
the idea of supplanting the "wrong” teaching se¬
quence with the “right” teaching sequence, one
which is "validated.” Similarly, we have gone from
a time when the instructional sequence was a bal¬
ance between tradition and the lowest common de¬
nominator of each subject, to a time when teachers
may pick "flexible optimized strategies” from text-
©
5
9
If the computer is a universal control system,
let’s give kids universes to control.
7,Vt
Some premises relevant to teaching
1. The human mind is born free, ye! everywhere *
t it is in chains. The educational system serves j
mainly lo destroy for most people, in varying »
degrees, intelligence, curiosity, enthusiasm, und *
intellectual initiative and self-confidence. Wc £
are horn with these. They arc gone or severely £
diminished when we leave school. £
2. Everything is interesting, until ruined for us. *
Nothing in the universe is intrinsically unin- «
teresting. Schooling systematically ruins things £
for us, wiping out these interests, the last thing £
to be ruined determines your profession. £
3. There arc no "subjects ” The division of the £
universe into "subjects" for teaching is a mat- £
ter of tradition and administrative convenience. £
4. There is no natural or necessary order of I
learning. Teaching sequences are arbitrary. £
explanatory hierarchies philosophically spuri- £
ous. "Prerequisites” arc a fiction spawned by *
the division of the world into "subjects;" and £
maintained by not providing summaries, intro- ♦
duclions or orientational materials except lo *
those arriving through a certain door. £
5. Anyone retaining his natural mental facilities £
can learn anything practically on his own, £
given encouragement and resources. £
6. Most teachers mean well, but they are so £
concerned with promoting their images, atli- £
tudes and style of order that very little else £
can be communicated in the time remaining, £
and almost none of it attractively. £
books. 1 And this all ignores a simple fact; all arc
arbitrary. Instructional sequences aren't needed at all
if the people are motivated and the materials are clear
and available
Testing as we know it (integrated with walled curric¬
ula and instructional sequences) is a destructive activ¬
ity, particularly for the orientation which it creates.
The concerns of testing arc extraneous; learning to
figure out low-level twists in questions that lead no¬
where. under pressure.
The system of tensions and defenses it creates in the
student's personality are unrelated to the subject or
the way people might relate to the subject. An exploit¬
ive attitude is fostered. Not becoming involved with
the subject, the student grabs for rote payoff rather
than insight.
All in a condescending circumstance. Condescension
is built into the system at all levels, so pervasive it is
scarcely noticed. Students arc subjected to a grim
variety of put-downs and denigrations. While many
people evidently believe this to be right, its productivity
in building confident and sclf-rcspccling minds may be
doubted
The problems of the school arc not particularly the
teacher's fault. The practice of leaching is principally
involved with managing the class, keeping up face, and
projecting the image of the subject that conforms to the
teacher's own predilections. The educational system is
thereby committed to the fussy and prissy, to the en¬
forcement of peculiar standards ol righteousness and
the elevation of teachers—a huge irrelevant shell
around the small kernel of knowledge transmitted.
The usual attacks on computer teaching tend lo be
sentimental and emotional pleas for the alleged hu¬
manism of the existing system. Those who arc opposed
to the use of computers to teach generally believe the
computer to be "cold” and “inhuman." The teacher
is considered "warm” and "human." This view is ques¬
tionable on both sides.
The computer is as inhuman as we make it. The
computer is no more “cold" and “inhuman” than a
toaster, bathtub or automobile (all associated with
warm human activities). Living teachers can he as in¬
human as members of any people-prodding profession,
sometimes more so. Computcrists speak of "freeing
teachers for the creative part of their work;” in many
cases it is not clear what creative tasks they could be
freed for.
At the last, it is lo rescue the student from the in¬
human teacher, and allow him lo relate directly and
personally to the intrinsically interesting subject mat¬
ter, that wc need to use computers in education.
Many successful systems of tcachcrless learning exist
in our society; professional and industrial magazines;
conventions and their display booths and brochures,
technical sales pitches (most remarkably, those of med¬
ical “detail men”); hobbyist circles, which combine
personal acquaintance with a round of magazines and
gatherings; think-tanks and research institutes, where-
specialists trade fields, and the respectful briefing.
None of these is like the conventional classroom
with its haughty resource-chairman; they arc not run
on condescension, and they get a lot across. Wc tend
lo think they are not "education" and that the methods
cannot be transferred or extended to the regions now
ruled by conventional teaching. But why not?
If everything we ate were kibbled into uniform dog-
food, and the amount consumed at each feeding time
tediously watched and tested, wc would have little
fondness for eating But this is what the schools do lo
our food for thought, and this is what happens to
people s minds in primary school, secondary school
and most colleges
rJw'n ,he Way 10 P foduce a n*fion of sheep or
" C are senous . obout wanting people to have
creafve and energetic minds, it is not what w C ought
wiX wCT and e " ,hu * iasm arc na ‘ u ' a ' >hc human
spirit, why drown them?
w
Education ought to be dear, inviting and enjoyable,
without boohy-irnps. humiliations, condescension or
boredom It ought to leach and reward initiative, curi¬
osity, the hnhit of self-motivation, intellectual involve¬
ment. Student* should develop, through practice, abili¬
ties to think, argue and disagree intelligently.
Educators and computer enthusiasts tend to agree on
these goals. Bui what happens 0 Many of the inhuman¬
ities of the existing system, no less wrong for being
unitentional. are being continued into computer-assist¬
ed teaching
Although the promoters of computer-assisted instruc¬
tion, affectionately called “cai,” seem to think of them¬
selves as being at the vanguard of progress in all di¬
rections. the field already seems to operate according
:o a stereotype. We may call this "classic" or "conven-
ional" CAt. a way of thinking depressingly summarized
n “The Use of Computers in Education ” by Patrick
iuppes. Scientific American, September, 1966, 206-
220. an article of semi-classic stature.
It is an unexamined premise of this article that the
computer system will always decide what the student
is to study and control his movements through it. The
student is to be led by the nose through every subject,
and the author expresses perplexity over the question
of how the system can decide, at all times, where to
lead the student by the nose (top of col. 3, p. 219).
But let us not anticipate alternatives.
It is often asserted (as by AJpcrt and Bitzer in '* Ad¬
vances in Computer-Based Education Science.
March 20, 1970) that this is not the only approach
current. The trouble is that it seems to be the only ap¬
proach current, and in the expanding computer uni¬
verse everyone seems to know what cai “is.” And this
is it.
Computer-assisted instruction, in this classical sense,
is the presentation by computer of bite-sized segments
of instructional material, branching among them ac¬
cording to involuntary choices by the student ("an¬
swers”) and embedding material presented the student
in some sort of pseudo-conversation (“Very good
Now, Johnny, point at the . . .")
CAI: Based on unnecessary premises
At whichever level of complexity, all these conven¬
tional cai systems are based on three premises: that
all presentations consists of items, short chunks and
questions; that the items are arranged into sequences,
though these sequences may branch and vary under
control of the computer; and finally, that these sequen¬
ces are to be embedded in a framework of dialogue;
with the computer composing sentences and questions
appropriately based on the student’s input and the
branching structure of the materials. Let us call such
systems sic (Sequenced-Item Conversational) systems.
These three premises are united. For there to be
dialogue means there must be an underlying graph
structure of potential sequences around which dialogue
may be generated; for there to be potential sequences
means breakpoints, and hence items.
Let us question each of the premises in turn.
1. Is dialogue pleasant or desirable? Compulsory
interaction, whether with a talking machine or a stereo¬
typed human, is itself a put-down or condescension.
(Note that on superhighways there is often a line of
cars behind the automatic loll booths, even when the
manned ones are open.) Moreover, faked interaction
can be an annoyance. (Consider the green light at the
automatic toll booth that lights up with a “thank you.")
Moreover, dialogue by simple systems tends to have a
fake quality. It is by no means obvious that phony
dialogue with a machine will please the student.
2. Is the item approach necessary? If the student
were in control, he could move around in areas of
material, leaving each scene when he got what he want¬
ed. or found it unhelpful.
3. Are sequences necessary? Prearranged sequences
become unnecessary if the student can see what he has
yet to leant, then pursue it.
fte- sense ot prestige and parhcipalron
CAI: unnecessary complication
The general belief among practitioners is that ma¬
terials .for computer-based teaching are extremely dif¬
ficult to create, or "program." Because of possible
item weakness and the great variety of possible se¬
quences within the web, extensive experimentation and
debugging are required. Each item must be carefully
proven; and the different sequences open to a student
must all be tested for their effectiveness. All possible
misunderstandings by a student need to be anticipated
and prevented in this web of sequences, which must be
designed for its coverage, correct order, and general
effectiveness.
CAI: general wroogfulness
Computers offer us the first real chance to let the
human mind grow to its full potential, as it cannot
within the stifling and insulting setting of existing
school systems. Yet most of the systems for computer-
assisted instruction seem to me lo be perpetuating and
endorsing much that is wrong, even evil, in our present
educational system, cai in its conventional fo r m en¬
larges and extends the faults of the American educa¬
tional system itself They are;
• Conduciveness to boredom;
• The removal of opportunities for initiative,
• Gratuitous concerns, both social and administra¬
tive (“subject." "progress" in subject),
• Grades, which really reflect commitment level,
anxiety, and willingness to focus on core emphasis;
• Stereotyped and condescending treatment of the
student (the “Now-Johnny” box in the computer re¬
placing the one that sits before the class).
• The narrowing of curricula and available materials
for "results" at the expense of motivation and general¬
ized orientation,
• Destructive testing of a kind we would not permit
on delicate machinery, and.
• An overt or hidden emphasis on invidious ratings.
(Ungraded schools are nice—but how many units did
you complete today?).
There arc of course improvements, for instance in
the effects of testing. In the tell-tcst, tell-tesl nattering
of cai, the testing becomes merely an irritant, but one
certainly not likely to foster enthusiasm,
But isn't CAI ‘scientific?’
Part of cai's mystique is based upon the idea that
leaching can become "scientific" in the light of modern
research, especially learning theory. It is understand¬
able that researchers should promote this view and
that others should fall for it.
Laymen do not understand, nor arc they told, that
"learning theory” is an extremely technical, mathemat¬
ically oriented, description of the behavior of abstract
and idealized organisms learning non-unified things
under specific conditions of motivation and non-dis¬
traction.
Let us assume, politely, that learning theory is a
full and consistent body of knowledge. Because of its
name, learning theory has at least what wc may call
nominal relevance to teaching; hut real relevance is
another matter, it may he relevant as Newtonian equa¬
tions arc to shooting a good game of pool: implicit but
without practical bearing.
Because of the actual character of learning theory,
and its general remoteness from non-stcrilc conditions,
actual relevance to any particular type of application
must still be demonstrated. To postulate that the theory
still applies in diluted or shifted circumstances is a
leap of faith. Human beings arc not. taken all together,
very like the idealized pigeons or rats of learning
theory, and their motivations and other circumstances
arc not easily controlled. Studies concerned with rate
of repetition and reinforcement are scarcely relevant
if the student hates or docs not understand what he is
doing.
I do not mean to attack all iai. or am teaching
system which is cltcciivc and gratifying. What I doubt
is that sit systems lor c ai will become more and more
wonderful as effort progresses, m that the goal of talk¬
ing tutorial systems is reachable and appmjui.iic. And
what I further suspect is that we are building Ixuvdom
systems that nol only make hie duller hut sap intellec¬
tual interest in the same old way.
Should systems ‘instruct?*
Drill-and-practice systems arc definitely a good thing
for the acquisition of skills and response sets, an im¬
provement over workbooks and lhe like, furnishing
both corrections and adiustmcnt. I hey are boring, hut
probably less so than the usual materials. Bui the c ai
enthusiasts seem to believe the same convorsalionali/ed
chunk techniques can he cxlenled lo the realm of ideas,
to systems that will tutor and chide, and that this will
provide the same sort of natural interest provided by
a live tutor's instruction.
The conventional point of view in cai claims that
because validation is so important, it is necessary to
have a standardized format of item, sequence and dia¬
logue. This justifies turning the endeavor into picky-
work within items and sequence complexes, with
attendant curricular freeze, and student inanition and
boredom. This is entirely premature. The variety of
alternative systems for computer leaching have nol
even begun lo he explored. Should systems "instruct "
ai all?
‘Responding Resources’ and ‘Hyper-Media*
At no previous time has it been povsihle to create
learning resources so responsive and interesting, or lo
give such free play to the student's initiative as we may
now. Wc can now build computer-based presentational
wonderlands, where a student (or other user) may
browse and ramble through a vast variety of writings,
pictures and apparitions in magical space, as well as
rich data structures and facilities for twiddling them.
I hese wc may call, collectively, "responding resources."
Responding resources arc of two types: facilities und
hyper-media.
A futility is something the user may call up to pci-
form routinely n computation or other act. behaving
in desired ways on demand Thus joss (a clever desk
calculator available at a terminal) and the Culler-Freed
graph-plotting system (which graphs arbitrary func¬
tions the user types in) are facilities.
Hyper-media arc branching or performing presenta¬
tions which respond to user actions, systems of pre¬
arranged words and pictures (for example) which may
he explored freely or queried in stylized ways. They
will not he ‘•programmed." bill rather designed, written
drawn and edited, hv authors, artists, designers and
editors (To call them "programmed” would suggest
spurious technicality Computer systems to present
them will he “programmed.”) l ike ordinary prose anti
pictures, they will be media: and because they are in
some sense “multi-dimensional." wc may call them
Itvper-media, following the mathematical use of the
term "hyper-”.
A modest proposal
The alternative is straightforward. Instead of devis¬
ing elaborate systems permitting (he computer or it*
instructional contents to control the situation, why
not permit the student to control the system, show him
how to do so intelligently, and make ji easy for him
to find his own way? Discard the sequences, items
and conversation, and allow the student to move freely
through materials which he may control. Never mind
optimizing reinforcement or validating teaching se¬
quences. Motivate the user and let him loose in a
wonderful place.
Let the student control the sequence, put him in
control of interesting and clear material, and make him
feel good—comfortable, interested, and autonomous.
Teach him to orient himself: not having the system
answer questions, all typed in, but allowing the student
to gel answers by looking in a fairly obvious place.
(Dialogue is unnecessary even when it does not in¬
trude.) Such ultra-rich environments allow the student
to choose what he will study, when he will study it and
how he will study it, and lo what criteria of accomplish¬
ment he will aim. Let the student pick what he wishes
to study next, decide when he wishes lo be tested, and
give him a variety of interesting materials, events and
opportunities. Let the student ask to be tested on what
he thinks he knows, when he is ready, selecting the
most appropriate form of testing available.
This approach has several advantages. First, it cir¬
cumvents the incredible obstacles created by the
dialogue-item-sequence philosophy. It ends the danger
to students of bugs in the material. And last, it does
what education is supposed to do—foster student en¬
thusiasm, involvement, and self-reliance.
Under such circumstances students will actually be
interested, motivated to achieve far more than they
have ever achieved within the normal instructional
framework; and any lopsidedness which may result
will be far offset by the degree of accomplishment
which will occur—it being much better to create lop¬
sided but enthusiastic genius specialists than listless,
apathetic, or cruelly rebellious mediocrities. If they
start soon enough they may even reach adulthood with
natural minds: driven by enthusiasm and interest,
crippled in no areas, eager to learn more, and far
smarter than people ordinarily end up being.
Enthusiasm and involvement are what really count.
This is why the right to explore far outweighs any
administrative advantages of creating and enforcing
"subjects" and curriculum sequences. The enhancement
of motivation that will follow from letting kids learn
anything they want to learn will far outweigh any
specialization (hat may result. By the elimination or
benign replacement of both curriculum and tests in an
ultra-rich environment, we will prevent the attrition of
the natural motivation of children from its initially
enormous levels, and mental development will be the
natural straight diagonal rather than the customary
parabola.
Is it so hard? some ideas
cai is said to be terribly hard. It would seem all the
harder, then, to give students the richer and more
stimulating environments advocated here. This is be¬
cause of the cramped horizons of computer teaching
today. Modest goals have given us modest visions, far
below what is now possible and will soon be cheap.
Discrete (Chunk Style) Hypertexts
The static computer displays now associated with
cai will give way to dynamic displays driven from
minicomputers, such as the idiiom, ibm 2250 4 or
Imlac pos-l. (The last of these costs only $10,000
mm by 1975 such a unit will probably cost $1,000
or less.) Not only will computers be much cheaper, but
their usability will improve: a small computer with a
fair amount of memory will be able lo do much more
than it can now, including operate a complex display
from its own complex data base.
It is generally supposed that systems like these need
big computers and immense memories. This is not
true if we use the equipment well, organize storage
cleverly, and integrate data and display functions under
a compact monitor. This is the goal of The Nelson
Organization’s Project Xanadu, a system intended to
handle all the functions described here on a mini¬
computer with disk and tape.
Discrete hypertexts
“Hypertext” means forms of writing which branch
or perform on request; they are best presented on com¬
puter display screens.
In ordinary writing the author may break sequence
for footnotes or insets, but the use of print on prpr
makes some basic sequence essential. The compu,
display screen, however, permits footnotes on footnotes
on footnotes, and pathways of any structure the author
wants to create.
Discrete, or chunk style, hypertexts consist of sepa¬
rate pieces of text connected by links.
Ordinary prose appears on the screen and may be
moved forward and back by throttle. An asterisk or
other key in the text means, not an ordinary footnote,
but a jump —to an entirely new presentation on the
screen. Such jumpable interconnections become part
of the writing, entering into the prose medium itself as
a new way to provide explanations and details to the
seeker. These links may be artfully arranged according
to meanings or relations in the subject, and possible
tangents in the reader’s mind.
Welcomingness and control
CHOICE POINT
■ GO ON
I DON'T UNDERSTAND
■ SO FAR I’M BORED
* EXPLAIN THE BIG PICTURE
■ DETAILS PLEASE
■ TIE THIS IN WITH SOMETHING
I KNOW
LET’S GO BACK TO LAST CHOICE]
\ POINT
\« GIVE ME MORE CHOICES
MORE CHOICES
TEST ME
DRILL ME
RIDDLE ME
DRAW ME A DIAGRAM
TELL ME A RELEVANT JOKE
CHANGE THE SUBJECT
SURPRISE ME
A hypergram is a performing or branching picture;
for instance, this angle, with the bar-graph of its re¬
lated trigonometric functions. The student may turn
the angle upon the screen, seizing it with the light-pen,
and watch the related trigonometric functions, dis¬
played as bar charts, change correspondingly.
Hypergrams may also be programmed to show the
consequences of a user’s prod—what follows or ac¬
companies some motion of the picture that he makes
with a pointing tool, like the heartbeat sequence.
Stretchtext^!
Lills iii (he details
This form or hypertext is easy to use without getting
lost. As a form of writing, it has special advantages for
aiscursive and loosely structured materials—lor in¬
stance historical narratives.
There arc a screen and two throttles. The first
throttle moves (he text forward and backward, up and
down on the screen. The second throttle causes changes
in the writing itself; throttling toward you causes the
texl to become Iona . r by minute degrees. Gaps appear
between phrases; words and phrases pop into the
gaps, an item at a lime. Push back on the throttle and
the writing becomes shorter and less detailed.
The stretchtext is stored as a text stream with extras,
coded to pop in ami pop out at the desired altitudes:
i -A
Stretchtext is a form of wrilimj,
It is rend from a screen. The user
controls it with throttles. It yets
longer and shorter on demand.
V.
Stretchtext, a kind of hypertext,
is basically a form of writing closely
related to other prose. It is read by
a user or student from a computer
display screen. The user, or student,
controls it, and causes it to change,
with throttles connected to the
computer. Stretchtext gets longer,
\ by adding words and phrases, or
l shorter, by subtracting words and
\ phrases, on demand.
The student of anatomy may use his light-pen as a
scalpel for a deceased creature on the screen. As he
cuts, the tissue parts. He could also turn the light-pen
into hemostal or forceps, and fully dissect the creature
—or pul it back together again, fThis need not be a
complex simulation. Many key relationships can be
shown by means of fairly simple schematic pictures,
needing a data structure not prohibitively complicated.)
Hypermap zips up or down
The screen is a map. A steering device permits the
user to move the map around the world’s surface; a
throttle zooms it in. Not by discrete jumps, but ani¬
mated in small changes, the map grows and grows in
scale. More details appear as the magnification in¬
creases. The user may request additional display modes
or “overlays,” such as population, climate, and indus¬
try. Such additional features may pop into view on
A “hypergram” is a picture that can branch or per¬
form on request. In this particular example, we see
on the screen a line-drawing with protruding labels.
When the student points at a label, it becomes a sliding
descriptive ribbon, explaining the thing labelled.
Or asterisks in an illustration may signal jumps to
detailed diagrams and explanations, as in discrete
hypertexts.
f typcr-comics arc fun
Hyper-comics arc perhaps the simplest and most
straightforward hyper-medium. The screen holds a
comic strip, but one which branches on the student's
request. For instance, different characters could be used
to explain things in diJTcrcnl ways, with the student able
to choose which type of explanation he wanted at a
specific lime
‘Tcchnicalitv' is not necessary
Proponents of cai want us to believe that scientific
teaching requires a certain setup and format, incom¬
prehensible to the layman and to be left to experts.
This is simply not true. “Technicality” is a myth. The
problem is not one of technical rightness, but what
should be.
The suggestions that have been given are things that
should be; they will be brought about. □
DM 20
*r
*
It wbb explained on the other side that
computers have no fixed purpose or style of
operation, but can be set in motion on detailed
and repetitive tasks in any realm of human in¬
terest-- as long as those tasks are exactly
specifiable in certain humdrum ways.
Now, if you had a machine like that
burning a hole in the comer of your office,
what would you really want to do with it?
You can't drive it on the road.
You can't make love to it. (But see p.' 1 ’*.)
You can't cook in it, or get the news
on it.
To get it to control elaborate events in
the real world requires a lot of expensive equip¬
ment and interfaces, so cross that out.
Yet suppose you have an inquiring imag¬
ination-- which is not unlikely, considering
that you are reading this sentence.
And we are also supposing (from an ear¬
lier paragraph) that you have a computer.
What sorts of thing would you do with it?
Things that are imaginative and don't
require too much else.
f am hinting at something.
too IT wkff rn oeey
|i*ow yoO *Vff
cA»mc wU»t~
«♦> VlUf
and If chla idea doesn't cum you on,
the rest of this book is probably not for you.
The techniques of making plcturea by
computer are called computer graphics .
But that includes the dull kinds of making
pictures by computer, the ones that do it with
pens and printing machines.
You will therefore we that to understand
all the different computer display terminals,
you would have to understand all the different
computer display techniques; unfortunately
we can only cover a few here, and those but
sparely.
The techniques of making computers
present things interactively on screens Is called
computer display . (Some say "interactive com¬
puter graphics;" this is not just too long, but
too restrictive as well: interactive text systems
are not "graphic" or pictorial, but they are going
to be a profoundly important area of computer
display.)
(Incidentally, the silly word "interaction”
was coined because the previous word "inter¬
course.” which meant exactly the same thing,
had racy connotations for some people. Cf.
"donkey" and "rooster," also relatively recent.)
You will note that computer display is
whet makes possible the computer terminals with
screens that we saw on the other side. All
that a screen-terminal is is some sort of com¬
puter display, to which a keyboard has been
added.
Some of the types of computer display to
be covered hereabouts include;
CRT, or cathode-ray tube, displays;
these are my favorite because the
stuff on their screens may be
animated by the computer.
video displays, which use television
techniques. These have troubles
deriving from the way a TV picture
is timed.
panel displays, i.e., those which appear
on a flat panel. These are going
to be cropping up all over. (The
pictures can't move much, but the
devices are going to be cheap.
Flat, too. Some people think that's
very important.)
3-D displays, especially of the CRT type.
NOTE; this term refers ambiguously
to two different things: setups which
present Oat views of three-dimensional
scenes, and those which present
stereoscopic views of 3 D scenes;
these are much rarer.
image synthesis or' halftone techniques
and systems. These are computer
programs and special devices which
make shaded or photograph-like
pictures. (This happens to be a
favorite topic of mine, and so there's
quite a bit on it here, a lot of which
is not widely known in the field.)
bibliography * CYC*
Newman and Sproull, Interactive Computer Graphics . _
McGrav, $15. Your basic text on all forms of^
computer graphics (and thus animation).
Responding computer displays
come in all sizes and prices. This
little setup (in the under-$10,000
class) is a PDP-8 minicomputer with
home-built display circuitry. Gothic
lettering data structure available
from somebody in the military; mes¬
sage courtesy of R.E.S.I.S.T.O.R.S.
The big display is an IBM 2250 (over
$100,000, including minicomputer).
GET
rne
m?
f zx
s yT e M
dJu, fc_ lt^
bUSv
fey-
«k- w»r.*vf
*ir/
p<-k°'sT\
_ r- qmO
Stic.*, or
MT* STRucLTUR.*.
t'-A'it =f ponV-e\j
Jvick osei_ inV«rree.t^
OJLWe/S-HAktNG-
DAT* fTRD C.TOK.C
(iweof^'Ut dol«>W of
iitwsjfcA, "e<*. i l Ah
wm*
rfy »|w*u iViceifcr
»m, cofabJTtlr tu^eu,.
/ ' O* Itr
^ 'Wfek, 1 ' le * hcT^V
<P«w|
Utoe **«_ fa "iW'liVt' 1
Mw* J J 5 ur
bA’<-k ►'X Iwklrt ►.‘I
>„ r «4)
Ho|oy*.
OUTTUT
(Uuiik ^
’ J -*• ’ v
kavv *
^ l . C wfl/ i^‘r k 1
601
JWW WlUfolS
Some computer displays have to be deeply
attached to • computer and some don't. These
latter we call display terminals .
A display terminal is like an ordinary
computer terminal (see p If): that is, funda¬
mentally a device by which a computer and a
person can type at each other .However, dis¬
play terminals have screens.
Now, some display terminals only show
text, just like ordinary printing terminals
(described on the other side). But manufac¬
turers are free to add any other features, and
so different manufacturers make it possible to
do various kinds of picture-making with their
particular display terminals, if appropriate
programs are running in the computer that con¬
trols them.
Some devices are sold as display terminals
but actually, to further confuse the issue,
contain complete minicomputers. (The fact
that the manufacturer may not stress this is
simply a marketing angle he has chosen.) Simi¬
larly, certain terminals contain microprocessors
(see p. V4 ), which means they can be programmed
to benave like various other terminals, but ordi¬
narily they cannot be programmed to do much else
by themselves.
Without getting into it deeply, there are two main
types of display terminal: those that are refreshed and
those that are not. A refreshed display is one whose
viewing surface fades and must be continually re-filled;
a non-refreshed display somehow stores the presentation
in the viewing surface itself.
Non-refreshed displays simply take the symbols
from the computer, blam them onto the screen, and that's
it until the screen is erased (by cither the computer or
the user).
This honey ia the GT-40
from DEC ($12,000, in¬
cluding computer — the
thing with teeth, below),
It’a a eubroutining
diaplay (eee p . DH 23).
Han ia playing Moon-
lander game: control¬
ling screen action with
lightpen. Computer eimulatee real moon lander
Pevereed white-ta-black for readability here.
Refreshed displays have to have sone other kind of
of symbolic (digital) memory, whose contents repeated¬
ly go to the screen:
Most refreshed displays use an actual television
screen-- that is, a CRT (see p.b^t-7) whose entire area
is repeatedly re-painted by the clctron beam.
Since computers send text out to terminals as in¬
dividual alphabetic and punctuation codes, each terminal
must contain circuitry to change the character code to a
visible alphabetical character on the screen. Such a
piece of circuitry is called a character generator. There
are various kinds, they go at various speeds, some offer
more different characters than others.
Display terminals generally have a little marker, or
cursor , that the user or the computer can move around the
screen. The computer can sense what the user is pointing
at by the motion codes it gets, telling where the user has
moved the cursor.
I had intended here to print a little directory of
display terminal manufacturers, but there simply is not
time. See section on terminals, other side.
Note that the term video terminal is often used, in¬
correctly, for any display terminal. The term "video"
should only be used when the screen is refreshed by an
actual video raster. (See "Lightning in a Bottle," p.^Atf-f.)
Text terminals (also called alphabetic terminals,
character terminals or keyscopes) simply show written text,
put in either by the computer or the user. (Some terminals,
called transaction terminals, can be divided up into specific
areas that" "the user may and may not type into-- for banking
and stuff. However, whether that form of terminal is
necessary may also be a matter of taste in the program
design.)
Text terminals range in price from, say, $1500 on up
to $6500. (This last is the price of a remarkable color
text terminal demonstrated by Tec, Inc., at the 1974 National
Computer Conference. Each alphabetic position could con¬
tain a letter and/or a bright color; altogether the screen
could hold big colorful pictures made up of these bright
spaces. Ostensibly just a text terminal, actually the de¬
vice could be regarded as an Instant Movie Generator for
television animation. But it may take Tec, Inc. awhile to
realize what they have created.)
Graphic terminals offer some kind of pictures on their
screens. TKese come in a great variety: line-drawing, some
without, some with levels of grey. Of interest to the be¬
ginner are;
"The Tektronix." (Also called "the greenie," or
"the green screen.") Tektronix, Inc., makes a
display based on a pale green storage tube they
make. (So does Computer Displays, Inc.) Such
displays allow you to put more and more text and
pictures on a screen, crowding it all up-- but
you can't take the lines or words off individually.
"The PEP." Excellent (but very expensive) display
that comes out to a video screen from a high-re¬
solution storage tube. Permits grey scales and
selective erase. Princeton Electronic Products.
T»|E WOH)>T^oF
iHTOMSJlte tty WTEftf
If you have not seen interactive computer
display, you have not lived.
The IDIgraf (Information Displays, Inc., Mount Kisco,
NY). Allows line pictures with animation ; interest¬
ing unit; somewhat less than $10,000.
A PLATO-like terminal (see PLATO terminal, nearby, and
ppfMfc-JT) is now available for use with STANDARD com¬
puter interfaces and software. "Less than $5000"
from Applications Group, Inc., P.0. Box 444A, Maumee,
Ohio 43537.
Except for a few people who can imagine it--
and I m trying to help you with that as hard as ]
can-most people just don't get it till they sei
it. They can't imagine what it's like to manipu¬
late a picture. To have a diagram respond to yoi
To-^jange one part of a picture, anT watbi tTTe' ri
adapt. These are some of the things that can hat
pen in interactive computer display-- all depend]
of course, on the program. P
For . SOBe reason there are a lot of people w)
pooh-pooh computer display: they say it's "not
?ss: , :: rjr -v r " n ? t worth u *" ° r that "y° u can *
just as good results other ways."
ti..nf erSOnall)r ' 1 wouldn,t thing of trying to
So computer display on "practical" grounds.
■aH™ 5 offers X° u faster access to infor-
■ation and pictures and maps amt diagrams, the
t0 * 1Bulate extremely complex things by
comw 11 ? piCtur ? 5 ' the ability to go through
* fractions with the system in ver}
world i * he ablllt > r to create things in the
«orld almost instantaneously (say, by creating
fabric patterns which .are then automatically 8
deS t?V£ objects whicb are then auto-
tKt i{ ly *M led u y macbines )» and never mind
oil refin!! S / he u US ! r ! f ay ' t0 contr ol entire
1 refineries by the flick of a lightpen.
far * s I,|n concerned, these matters
world- »°u y 1B P° rtant compared to changing the
thlk - ® . ln R education an excitement, rather
writik prx *° n; Raving scholars total access to
peonl!! R ?„ an i notes ’ in new complex form; allowin
lind t! * y imaginatively, and raising human
long avo- t »H P k t t ntlals they 5hould ha ve reached
level ihn,.r d hel P in « people think at the deepes
which confrnnt 1 ^ " eavy and C0 *P lex alternatives-
cn c °nfront us more ominously today than ever
REFRESHED HIGH-RESOLUTION COLOR SYSTEMS. A number of
companies manufacture computer displays allowing com¬
plex grey-scale pictures, including color. They are
expensive but very very nice. Indeed, if you buy them
in clusters, these fancy-picture scopes can cost as
little as text terminals. Some manufacturers are:
Data frisk . (Disk refresh.) Note: I once recommend¬
ed them to a consulting client of mine, who
later expressed complete satisfaction with
their equipment.
Ramtek. ($«-,.d»A3«0
Adage , Inc . Their model 200 is a video system re¬
freshed from semiconductor storage.
Comtal . (Disk.)
Spatial Data Systems . (Disk.)
Dlcorned . (Disk.) Extremely high resolution.
Student programmer Alan McNeil,
an art major, pondere something
or other. It may be the program
for the Nova apace-game he and
Pete Rowell are building.
Alan also made a film shoeing what
may have been the motions of the
continents, shooting straight off
the PLATO screen.
Some PLATO purists point out that
this is not exactly what PLATO
was originally intended for. So?
PLATO panel display (aee OH 26-7).
DH 21
The computer display screen Is the new
frontier of our lives.
That such systems should (and will) be
fun goes without saying. That they will also
be a place to work may be less obvious from
Ihe tone of this publication, bo 1 want to atresa
it here.
Making pictures with the GE
halftone system (sea pp. DM 32-9).
The thing about diaplay screens-- especial¬
ly the high-performance, subroutining kind--
is that the screen can become a place from
which to control events in the outside world.
Example: I believe a town in N.Y. State
has its electrical system hooked up to an ID1IOM
subroutining display (made by Information Dis¬
plays, Inc., and coupled to a Varian 620 mini¬
computer). Instead of having a wall with a big
painted map having switches set into it. like
many such control centers, the switches are
linked directly to the minicomputer, and a pro¬
gram in the minicomputer connects these circuits
to the pictures on the screen. Thus to throw
a switch in the real world, the operator points
with his lightpen at Ute picture of the switch ,
and the minicomputer throws the switch.
There are oil refineries that work the
same way. The operator can control flows
among pipes and tanks by pointing at their
pictures, or at symbols connected with them,
and bingo, it happens Out There.
In another case, a person designing some¬
thing at a screen can look across the room and
see a machine producing what he just finished
designing a few minutes ago. I wish I could
say more about that particular setup.
The true problem that I think is emerging,
though, is the problem of system response and
style . Okay, so you're controlling widget
assembly, or traffic light grids, at the CRT
screen. The real question is, how does the
screen behave and respond ? This is not, darn
it, a technical issue. It's psychological and
then some. The design of screen activities
which will enjoyably focus the user's mind on
his proper concerns-- no matter how personal
these may be-- is the new frontier of design,
of art, and of architecture. But more of that
later.
Now. the Xerox Corporation has said that
they intend to replace paper (or. the way I
heard it, " Somebody is going to replace paper
with screens, and it will be either IBM or us,
so let's have it be us.")
Well and good. Save the trees and stem
the grey menace. But the question is: what
will the systems be like? How should they per¬
form? What forms will information take? What
conventions, structures, diagrams, animations,
ways to sign things, ways to view things ...
HOW SHALL IT BE?
I am afraid that as long as people are be¬
fuddled with technicalities, or confused by those
who profess that these considerations are their
specialty by right, we will never get straight.
Lacking time for the full discussion, I give you
a motto:
IF THE BUTTON IS NOT SHAPED LIKE THE THOUGHT,
THE THOUGHT WILL END UP SHAPED LIKE THE BUTTON.
SAVING ENERGY WITH COMPUTER DISPLAY
A timely criticism of computer display is
that it needs electricity. But (as mentioned
elsewhere) it saves paper, and, importantly, it
bodes to save energy as well.
IF WE SWITCH TO COMPUTER SCREENS FROM
PAPER, PEOPLE WON'T HAVE TO TRAVEL AS MUCH.
Instead of commuting to offices in the cen er
of town, people can set up their offices in
the suburbs, and share the documentary struc¬
ture of the work situation through the screens.
This view has been propounded, indeed, by
fnrififtr director of research for
901
|F (WOTOtf ABF Tflf
WAVE OF THE fOTUfce,
J)IJPi/iV5 ACE
me SUItFSo/tExxS.
* THC KiMJ'j *, G*W«4.
YOUR BASIC TYPES OF COMPUTER DISPLAY
(Note: the term "display" is also used
in this field to refer to numbers and letters
that can be made to light up in fixed positions,
like on your pocket calculators. Those will
not be discussed here. If you’re interested
see an article on the subject by Alan Sobel,
Scientific American , early 1973 sometime.)
THE FORKED LIGHTNING
1. EARLIEST SYSTEM: A LITTLE PROGRAM
TO MAKE DOTS
The earliest setup connected a CRT to a
computer by the simplest possible means, and
made its pictures with dots on the screen— tt
sort of tattooing process.
It was simple because all the computer
did was furnish to the connecting circuitry (or
interface ) symbols specifying how far up, and
how far across the screen, the next dot should
be. These symbols were actually coded numbers,
and the interface turned them into voltages which
then moved the beam correspondingly. (This
process of making a measured voltage out of a
coded numerical symbol is called digital-to-analog
conversion , since (as explained on the other side)
the main meaning of "analog" these days is "in
a measured voltage.")
Now, this has several drawbacks. One is
that the lines are dotty; nobody likes that. A
more important annoyance, though, is that the
computer scarcely has time for anything else .
Here is a flowchart of what the computer has to
do in its program. (Even if you didn't look at
the other side of the book, flowcharts are nothing
scary. They're just maps of what happens.)
2. LINE-DRAWING HARDWARE
The next Btep in design is to get the com¬
puter program out of the business of drawing
lines by a succession of dots. So we build a
piece of hardware that the computer program may
simply instruct to draw a line. As an interface,
it looks to the computer like four separate
devices: registers that tell where on the Bcreen
the line must start ("first X" and "first Y") and
registers that tell it where to stop ("end X" and
"end Y").
" Because their words have
forked no lightning they
Do not go gentle into that good night."
— Dylan Thomas
The most basic, and yet eventually the
most versatile, computer display is that of the
CRT. or bottled lightning (as I like to call it).
It is, you know: a beam of electrons, just like
lightning in a storm, but from the neck of a
very empty bottle to its flat bottom, whose
chemically coated surface we watch. As manip¬
ulated by the computer, the CRT stabs its beam
to all corners of the faceplate: forked lightning.
Computer display began in the late forties.
Computers themselves were completely new,
and so was Mr. Dumont's magical Cathode Ray
Tube or CRT (see p .**£?) < developed on a
crash basis during the war so we could have
radar, and as long as it was around after the
war, we got television.
But the lightning bottle, or CRT, can be
used in a variety of ways. Its control plates,
which move the ray of electrons around on the
screen, can be given various different elec¬
tronic signals, causing the beam to move around
in different patterns. In normal video, the
signals move the beam in a zigzag pattern,
where the zigs are very close together and the
zags are invisible; the carpet of zigs covers
the screen over and over in a repetitive pattern,
and the beam's changing intensity paints the
picture.
But we can drive the CRT differently,
by using different control signals. For instance:
we can apply a measured voltage to the height
or "Y" plates of the CRT, moving the beam
to a given vertical position, and another meas¬
ured voltage to the sideways or "X" plates,
controlling its horizontal position.
Furthermore, and here was the indignity
of it, this system took far too long. To draw
a line with thirty dots in it took thirty times
around the loop in the flowchart, and since each
box in the flowchart takes at least one of the
machine's rock-bottom instructions-- usually
more-- then the main loop of this display routine
takes four separate operations per dot , or 120
operations for a stupid 30-dot line. Plainly
there has to be a better way to use an expensive
computer.
Ok wrdohoo}
Screen
UJt fa
o(- Juraktl /fVe.
Actually it wasn't just the ignominy of it,
but the fact that it took so long , that made this
a poor method. The amount of stuff the compu¬
ter could draw in l/40th of a second— and this
turns out to be how fast the whole picture has
to be made-- was too little. After l/40th of a
second the human eye can see the lines on the
CRT start to fade, and so the picture has to be
redrawn to make it bright again before that
happens. If your eye sees the picture fading,
then when the computer draws the picture again
you will see it get suddenly bright again— and
it will start to flicker. This is distracting, un¬
healthy, and disagreeable.
Note that the most important computer in
the history of computer display used this tech¬
nique 1 ^ This was the TX-2 at Lincoln Labora¬
tories, a highly-guarded installation outside Bos¬
ton which is formally part of MIT. The TX-2
was one of the first transistorized computers—
perhaps the first; and on it were programmed a
number of milestone systems, including Suther¬
land's Sketchpad, Johnson's Sketchpad IV, and
Baecker's GENESYS animation system (discussed
somewhere).
This speeds things up considerably, and
allows the computer program to display on the
CRT simply by telling the device what lines it
wants drawn. Moreover, the program is free
to do other things while each line is being
drawn, though this involves the problem of how
the program is to know when it’s time to send
out another line-- and we needo't go into that
here.
(Incidentally, it is a puzzling fact that
such a device is available nowhere, although
lots of people end up building one for themselves.
There was such a thing on the market a couple
of years ago-- line-drawing hardware with no
interface and no CRT— but it was withdrawn
because of reliability problems. A just price,
if anybody wants to go into that, would be five
hundred to a thousand dolars— this year.)
3. EVOLUTION FROM THIS: TWO OPTIONS
There are basically two way3 to go from
this basic starting point. Either we can keep
the display device intimately and integrally con¬
nected to the computer, or we can say the hell
with it and cut the display device loose as a
separate entity.
Ivan Sutherland has cannily noted that
there is a certain trap involved in these designs:
as we build additional "independent" structures
to take the burden of display away from the
computer, we are tempted to keep adding fea¬
tures which make the "independent" structure a
computer in its own right. This paradoxical
temptation Sutherland calls "the great wheel of
Karma" of computer display architecture.
It ia tempting to cut the display loose from
the computer. It means the computer can be
fully occupied wtth other matters than refreshing
the screen— preparing the next displays, per¬
haps. Many computer people believe this is the
right way to do it, and it is certainly one valid
approach. But unfortunately it also drastically
reduces the immediacy of the system's reaction,
making interaction with the system less intimate
and wonderful.
Approaches which put display refreshment
and maintenance in a separate device are less
interesting to me, and so that discussion contin¬
ues separately nearby . P^iZX).
W/NpJ
4 . THE SECOND PROGRAM FOLLOWER
On the other side of the book. I explained
that a computer ia basically a zippy device,
never mind how constructed, which follows a
program somehow stored symbolically in a core
memory. Such a device we call here a grogram
follower . While programs may be in many com
puter languages - all of them contrived systems
for expressing the user's wishes, in different
styles and with different general intent - under¬
neath they all translate to an inner language of
binary patterns, which may Just be thought of
as patterns of X and 0, or light bulba on and off.
The innermost program follower of the computer
goes down lists of binary patterns stored in the
core memory, and carries them out as specific
instructions. It also changes its sequences of
operations under conditions that the programmer
has told it to watch for.
*Duriw«
PSOfrf^l
RW4 F®uout^
dt of Lijli,
Vcfrvj kej scrltth*
L*|
fray**-.
We may call this also a n list-of-lines"
system, since the commands recognized by the
display program follower are typically patterns
that tell it what lines to draw.
Typically also it has its own way of jump¬
ing around in a program, and may jump to a
specific list of lines, or subpicture, from numer¬
ous other parts of its program. always returning
each time to the point from which it had jumped.
This -allows the same subpicture to appear in
numerous places on the screen at the same time.
(A program that can be jumped to by other pro¬
grams which then resume operation is called a
subroutine ; thus the real, or most prestigious,
name for such a device is a subroutining display .)
This design has some extraordinary advan¬
tages. One is that 6ince the computer's program
follower and the display's program follower both
share the same core memory, they can work to¬
gether most intimately. When the user demands
something new-- by typing, say, or •pointing
with a light-pen-- the computer can step in and
take various actions. Its program can compose
a new picture for the user, get something from
a disk or tape memory, or switch the display's
program follower over to a new picture it has
already prepared.
Most importantly, the computer can move
images on the screen, allowing interactive ani¬
mation on the screen under the user's control.
Each time the display is about to show the same
picture again, the computer simply supplies it
with a new starting point . Since the list of lines
is typically in the form of sequences of lines
relative to one another, the picture is drawn in
a new place each time-- and thus seen to move
on the screen.
This design has some extraordinary advan¬
tages. One is that atnee the computer's program
follower and the display's program follower both
share the same core memory. they can work to¬
gether moat Intimately. When the user demands
something new-- by typing, soy, or pointing
with a light-pen-- the computer can step in and
take various actions. Us program can compose
a new picture for the user, get something from
a disk or tape memory, or switch the display's
program follower over to a new picture It has
already prepared.
Most importantly, the computer can move
images on the scren, allowing interactive ani¬
mation on the screen under the user's control.
Each time the display starts to show the same
picture again, the computer simply supplies it
with a new starting point . Since the list of lines
is typically in the form of sequences of lines
relative to one another, the picture is drawn in
a new place each time-- and thuB seen to move
on the screen.
Finally, the computer itself is free most
of the time-- free, that is, to do other things,
which typically is always desirable. Just how
much the computer can or should do in such a
partnership is n matter of dispute. (Ordinarily
such devices arc spliced onto minicomputers;
and minicomputer fans, such as the author, see
no reason not to perform all services for the dis¬
play there in the minicomputer-- and a pox on
the big machines. Others, for various reasons,
see the subroutining display and its host mini
as needing the tender ministratious of a big-
computer via some sort of communications line.
There are various reasons for holding this en¬
tirely legitimate view. People who are devoted
to the high number-crunching capacity of big
computers, or to languages which require great
big computers to run in. have a right to their
opinion. Moreover, it is currently feasible to
store large bodies of data only on big computers
— not because big disk and tape memories can't
be easily attached to the small ones, for they
con, but they usually aren’t; and other ways to
tie minicomputers to big stores of data aren't
available yet.)
Subroutining displays often hove commends
allowing them to display text as well as lines
and dots. In the display of text they can use
the same technique of "moving the picture" by
starting its display at successively creeping
points; this will cause, say, whole paragraphs
to slide on the screen. The importance of
this feature in the displaying of text cannot be
overemphasized . As more and more people have
experience with displays of different kinds, they
are beginning to realize how confusing and dis¬
orienting it is for a screen to clear and be filled
with something new to read. You don't know
where you are . On subroutining displays,
moving the text can give the reader the same
sense of orientation he gets from turning pages
— an important thing to replace.
It must be stressed here that, just as com¬
puters themselves have no fixed mode or style
of operation, neither do computer displays; and
so the purpose of such devices is simply
HELPING PEOPLE SEE AND MANIPULATE
PICTURES AND TEXT
IN ANY STYLE, AND FOR ANY PURPOSE.
Since pictures can be of anything, and text can
be about anything, this effectively comprehends
the entire mental and working life of mankind.
Many readers will scoff, supposing that
computer display systems will always cost tons
of money. This is not the case. You can al¬
ready get a beauty, with its minicomputer, for
as little as $13,000; and this price should fall
to three or four thousand within a few years--
as soon as the minicomputer manufacturers realize
that the market frontier is not in the office or
factory, but in the home. But we're getting a
bit ahead of ourselves here.
TYPES OF SUBROUTINING DISPLAY
Some early subroutining displays used a
screen-dotting technique, but took the burden of
it off the computer itself: it would extract from
core memory the instructions telling it to draw
individual lines and show text. (1 refer here
to the DEC model 338, introduced about 1965;
this attached to a PDP-8 computer (see p/'J!])
and cost about $50,000 including the computer.)
Others drew lines as straight zips of light across
the screen; an example is the IBM 2250 display,
introduced about 1966. (The model 1 of this
device buckled directly to the 360, and cost, 1
believe, something like $75,000; its successor,
the model 4, buckled to their 1130 minicomputer,
the package costing some $150,000, and then
you were supposed to attach it to an IBM 360.)
The 2250 was a good machine, but in perfor¬
mance suffers greatly from the restrictions of
the 360 computer itself (see p.4j ).
These earlier machines are being replaced
by new versions with better-designed instructions
(see "Computer Architecture," p.^L. for a sense
of what well-designed Instructions are). An es¬
pecially fine unit ia DEC’a OT40, which buckles
on the exceptionally fine PDP-11 minicomputer
(see p.'W.). The GT40 ia illustrated nearby.
It goes for some $12,000 including the computer.
(That's today . we repeat. Consider not the price
at this instant, but how fast it's going down.)
The unita mentioned above are of the moat
baalc type: "two-dimensional," whose picture#
at any given instant correspond to flat drawings
- but, of course, derive their excitement and
magnificence from their capacity to interact,
change and animate what you arc looking at.
0 K r . dp&o.
Seldom has an event in a new field had as much power and
influence as what dour Ivan Sutherland did as a young man i the
period 1960-64, ~
The SKETCHPAD system,which was basically his thesis work at
HIT, was at once inventive, profound, overwhelmingly Impressive
to laymen, and deeply elegant. Simply for the universal influence
It has had In the computer field. It deserves our close attention.
Sutherland was one of the first people to understand the use
of the computer in helping people visualize things that weren't
fully clear yet— the opposite, of course, of the conventional
notion of computers. While computers had been made to do animations
as early as the forties, and computer graphics had been put to work¬
aday duties in the old SAGE system (defending us against bombera in
the fifties— remember the good old days?), Sutherland turned com¬
puter display from an expensive curiosity Into a true dream machine.
SKETCHPAD ran on the 36-bltTX-2, a one-of-a-kind experimental
machine at Lincoln Laboratories (a military research place nominally
a part of HIT). It had a display screen, light pen and lots of handy
switches.
SKETCHPAD was basically a drawing system. But rather than
simulating paper (as some people might have done), it found splendid
ways to take advantage of the computer's special capabilities.
In the Sketchpad system, Sutherland looked for ways that a
responding computer display screen could help people design things.
He pioneered methods of drawing on screens, with such techniques
as the "rubber-band line” (a straight line on the screen, one end
of which follows your Ughtpen while the other remains fixed), and
the "instance"— a subpicture stored in core memory which could
appear numerous times and ways in a larger picture).
This picture vaguely
simulates the "instance'
facility of Sketchpad t
by uh’icn an overall
picture may be created
out of repetitions of a
c ingle master pattern.
la ted with GRASS
language (see p.31).
The mind-blowing thing about Sketchpad was the way you could
move and manipulate the picture on the screen, with all Its parts.
One overall picture could be constructed out of a hundred copies
of a basic picture; then a change in the basic picture would im¬
mediately be shown In all hundred places. Or you could expand
your picture until It was effectively the size of a football field
(with you looking at a tiny view In the handkerchief-sized screen).
Or you could draw meshing gears on the screen, and with the light-
pen (and through the "constraint" facility) make one gear turn by
turning the other!
This elegant technique, the constraint .does not seem to have
been imitated even now. A "constraint" was a restriction placed
on some part of the overall stored picture complex. The user
could move or manipulate various parts of the picture on the screen,
but the parts that had constraints could only move in certain di¬
rections, or according to certain formulas, or dragging other
parts along, etc., as specified.
ThiB was a profound Idea, because It meant that any rules for
the manipulation of particular objects on the screen could be added
to Sketchpad as particulars within the larger program, rather than
having to be programmed In from scratch.
(One extremely interesting aspect of Sutherland's thesis, which
most people seem to have missed, dealt with displaying a structure
of constraints : that is, showing what elementa depended on what
other elementa, in a highly abstracted diagram that the system could
show you. This form of display haa remarkable possibilities.
After his brilliant SKETCHPAD work, Sutherland waa made head
of ARPA’s computer branch (see "Military," p. S9 ). There he was
Involved in many of the computer funding decision# of the late
sixties, which contributed to the Impetus of computer display.
(His predecessor, Lickllder, had been a pioneer in time-sharing, and
much of the forward movement in the cosrputer field In recent years
may Just have had to do with the strategic position of those two men
when they were at ARFA/IPT.)
Sketchpad went on as a continuing research tradition at Lin¬
coln Labs. Timothy Johnson, for instance, made a version of it that
allowed the drawing of three-dimensional objects; this became the
forerunner of the various three-dimensional line systems described
hereabouts.
From ARPA. Sutherland went on to the University of Utah,
whence be slipped off with the Computer Science department chair¬
man to found the Evans and Sutherland Computer Company, makers of
the top-of-the-llne computer display systems (see P• «n d P >*
iutherland's work has shown an elegance and inventiveness
iruling in the field. (For Instance, I believe one issue ot
licatlons of the ACH had two unusual article# by him: one de-
Lng an eccentric "Chinese auction" system worked out for
»Ung use of a computer, which benefited users more than any
jus method; and the infamous "Great Wheel of Karma ar “ c “’
he compared the design of graphical computers to the Hindu
■ of reincarnation— If you keep adding desirable f *“^“ r **
tslgn, soon you have another program follower and snot e
In the same box— over and over.)
DM 24
How do computers make movies?
Well, first of all, computers do not make
movies unless thoroughly provoked.
In fact, only people make movies. But
computers, if sufficiently provoked, will do a
lot of it: enact the movie and photograph it,
frame by frame.
There is no single method.
All forms of computer display and computer
graphics may be used to make computer movies.
"Computer animation" is any method of mak¬
ing movies in which a computer successively
draws or paints the successive individual frames,
which may be done by any of the methods mention¬
ed in this book. Now, since there are numerous
methods of making pictures by computer, then any
method of making different individual pictures,
in a succession of changing frames, is computer
animation. So a "computer movie" is any film
made by, or with the picture-making aid of,
computers.
In other words-- it’s no one thing.
Now, there already exist hundreds, if not
thousands, of computer movies. So far most of
them have been on technical topics-- the mecha¬
nics of satellite orbit stabilization, the
mechanics of explosions and so on.
Here are a few stills from some other movies,
more humanistic.
BIBLIOGRAPHY
Newman 5 Sproull, Interactive Computer
Graphics . McGraw, $T!T.
This is the textbook. Anyone
interested in computer display
should get this immediately.
An expensive journal. Computer Graphics
and Image Processing , comes from
Academic Press.
Sherwood Anderson,'* Computer Animation: A Survey.
Journal of Micrographics , Sep 71, 13-20.
Lists nineteen computer-animation languages
of that time.
Ken Knowlton, "Computer-Made Films," Filmmakers
Newsletter Dec 70, 14-20.
Instructions
for the desired
mouie enter the
computer as a
deck of punched
cards.
Vintage Knowlton , using BEFLJX.
(This language used the-COM quite
efficiently: dots were actually
out-of-focus letters. )
Vanderb^, > ..... . (
sSr h ry eh0i i C - influence of ‘
BEFLIX , which it grows from).
SOI
Lillian Schwartz
uuimj scH^erz
A talented artist with a feel for tech¬
nology, Ms. Schwartz has been working for
several years with Knowlton and others at
Bell Labs. Her films with Knowlton, mention¬
ed elsewhere, are marvelous. She now works
at a more permanent setup, a minicomputer
that runs successive images on a color TV
screen, employing a modified form of Knowl¬
ton’ s EXPLOR language. The work is immediate¬
ly viewable. This allows rapid film con¬
struction, not previously possible when the
work had to go through a slow animation
camera before she could see the result.
For Knowlton-6-Schwartz films contact: Martin
Duffy, AT&T, 195 Broadway, NY NY.
Schwartz & Knowlton. Using the EXPLOR language.
they make pictures and patterns scintillate and
grow together. (EXPLOR in some ways generalizes
Conway'8 Gone of Life ; see p.*jft and p.
JOHN WHITNEY
John Whitney is the ancestor of us all,
probably the first computer movie-maker. He
is also a gripping speaker.
In the forties, he built a special anima¬
tion stand-- using analog computers.
Deeply concerned with music, -Whitney has
in his images emphasized rhythmic and contra¬
puntal movement of shapes and lines.
Whitney films available from: Pyramid
Films, Box 1048, Santa Monica CA 90406.
John Whitney
J
¥
c.
8
J
¥
%
8
>
o
10
8
4
>
o
%
8
\
N
>
o
8
X.
>
X
V
<3
>
X
V
>
X
V
>
e>
X
\
>
eA
X
X
John Whitney
Lillian Sclsjartz
(with Henry Magnuski; see p.
■)
DM 25
fcw spate's floKrv/
fly now there are dozens of computer anima¬
tion languages— perhaps hundreds. Each one em¬
ploys the techniques of animation which itB de¬
veloper wanted to use, tied together in the ways
that seemed appropriate to him . (See "Computer
Languages," p. 15, and note Knowlton’s various
animation languages, described nearby.)
One of the more influential animation systems
has been Ron Baecker’a GENESYS, a 2-dimensional
animation system programmed in the late sixties at
MIT's high-aecurity Lincoln Laboratory. (It used
the TX-2 computer, mentioned elsewhere in this
book.)
Baecker, a cheery and genial fellow, expressed
interest as a student in using the TX-2 for anima¬
tion, and was allowed to. The system he produced
has a number of lessons for us all.
GENESYS is a "Good-Guy" system,as discussed
on p. I 3 Meaning, in this case, that it is
easy to learn and simple to use. As argued else¬
where in this book, making computer systems clear
and simple is often hard for the programmer (and
may go against his grain), but is essential.
PICTURES AND MOTIONS
GENESYS makes the following simplifications
of your movie: all images are made up of dots.
They do not change as you watch; animation con¬
sists of the images either moving or being re¬
placed .
To create an image, you draw it onto the
screen with a lightpen or a tablet. (As in the
SKETCHPAD system; see p.° M 2.T.) Parts of.the
Image may be changed until you're satisfied.
Now, to create the animation, you do the
same thing. Each image can be made to move on
the screen; and the path of the motion may be
drawn on the screen, through the picture area.
Not only that, but the timing of the motion is
controlled through the same diagram, by the
spacing of the dots. (Baecker calls his control
diagrams p-curves .)
Lastly, sections of picture may be re-
by means of the control diagram (as
indicated in picture above).
. . Havln E created such an animated sequence,
which is stored in symbolic form in the com¬
puter ( digitally"), you can view it on the
screen, decide what you do and don't like
about it, and change any part of it.
J he / ele « ance of the system is this:
Baecker made everything work the same way,
through control by Bcreen diagrams. He simpli
fied the animation problem In a clear and simp
Bon now teaches in Canada
infe with PDP-lla. The results
and is
should
into work-
be fun.
LYNM s«irq
Lynn Smith is a young Boston artist
who has worked extensively with Baecker’s
GENESYS (see nearby). One result has been
a movie which should be an example to us
all: "The Wedding Movie for Bob and Judy.”
(Her Friends Bob and Judy were getting
married, so she made this movie, a few mi¬
nutes long and quite clever, to celebrate
it.)
This is my favorite example of how
computers should be used in the human
world; it says more on the subject than
any dozen articles.
(One question that remains unanswered
is how a system like GENESYS could have
been used for such a purpose, seeing that
most people in the field believe GENESYS
only rum on the heavily-guarded TX-2 com¬
puter. Regretfully, I can shed no light
on this here.)
OMs
are what you use to make computer movies.
Basically they consist of a CRT and a movie
camera in a box.
Mostly they are used to put text on
microfilm by computer, so generally they
are not connected to a computer but run
off magnetic tape.
This turns out to be very annoying if
you want to hook up the computer directly
to the COM, and make movies that fill the
frames spot-by-spot. For that you really
need your own movie camera and a minicompu¬
ter. (Movie cameras that can be made to
start and stop by computer are called "pulse
cameras" or "instrumentation cameras.")
The society for people who make Movies by
Computer is called UAIDE<• (Users of Auto¬
matic Information Display Equipment— an
obsolete title). It used to be a club just
for companies that owned COMs made by
Stromberg Datagraphix, but evidently it has
now cut itself loose and become a subsidiary
of the National Microfilm Association, 8728
Colesville Road, Silver Spring MD 20910.
(NOTE: for them as want to make color
movies, the two alternatives have been either
to have separate primary negatives combined
at a lab— the "old Technicolor" process¬
or to add a complicated color-filter box to
a COM or other CRT setup. Such things are
available commercially now, from Dicomed—
a whole Color COM.)
BIBLIOGRAPHY
Computer Output Microfilm . $10 from National
Microfilm Assn., above. Lists available
COMs and service centers.
£ Computer
Output
Microfilm
devices )
frQI
Mui ^T^cic*
or
( Above ; i'LATO LSYt-SL
Anyuay, the word iteelf
goes through change* in
the Gone of Life (tee
P- ‘ft*, a* prog named
for the PLATO aye tern by
tktnny Sleator, and phota-
4
PLATO ta the world’s greatest computer display
system.*
Sone 500 users, st terminals around the world
(but mostly in Illinois), simultaneously tie up to
a big computer in Urbans, Illinois and savor instan¬
taneous pictorial and test deliveries on their bright
orange screens. Diagrams, explanations, tests and
even animation of a sort, flow almost without inter¬
ruption to the bright orenge screens sll over. The
system is extremely responsive: depending on what the
uaer is up to, its various programs can respond to
each pressing of s key, usually within a fraction of
a second.
While literature on PLATO is cnploua, it Is
hard to read and slightly sales-oriented. tut a f w
minutes' Intercourse with a PLATO terminal tuk.es
anyone an enthusiast for the system.
PLATO is the brainchild of Don Ritter, a L. of
Illlnola engineer who has devoted over a decade to
its creation. Michael Scrlven, no slouch himself,
has called Bitter "one of the great men of our time."
Bitsmr is also certainly one of the world's greatest
salesmen. A crew-cut, huggy-beer sort of a fellow,
he flies around the world demonstrating, lugging s
great terminal along. When you sign on the system
you may be informed that Bltzer la at that very mo¬
ment demonstrating In Paris or Tokyo. This "travel¬
ling dog and pony show," as PLATO staffers call it,
has created awe and excitement wherever it goes, and
where the awe has been strong enouf,' 1 to g. derate money,
Coere you will now find I'l.iTP terr-l -ala.
If you have a PLATO terminal— you presumably
being a school or other favored Institution— you can
in principle log onto PLATO from anywhere in the world,
Chough most terminals stay in one place. There is one
main network, consisting of a big Control Data compu¬
ter in Urbana (the model 6800; see p. ) with ten¬
drils extending out Into the phone system snd the
educational TV cable of the state of Illinois. When
the Urbana system Is "finished" and fully loaded, it
will have 1006 terminals; all are already spoken for .
The PLATO terminal Is a totally unique animal (see box),
manufactured (all too slowly) by Xagnavox, incorpora¬
ting a terrific plasma panel built by Corning- (The
pl.su* panel was Invented by Hitter, and even though
much of PLATO was publicly funded, he is reputedly
rich from it. We said he was s great politician.)
In term* of high performance for lot* of users.
Various system* (detoribed hereabout*) offer
more paver, but at huge ooet.
As a first taste of interaction
on a graphical couputer systeu, PLATO
can'be a thrilling ainU-opener-- es-
pec tally to people w.io think couuuters
can only behave loutisiily or through
printout.
PLATO Is a complect stand-alone system, with Its
own monitor program or "operating system" (eee p. *#5")
running on Che CDC 6800 computer all by Itself. It
does not run on any other manufacturer’s computers, or
simultaneously with eny other big programs. It com¬
municates only with PLATO terminals, no other, and
PLATO terminals, beceuee of their unusual deelgn, can
coreeunlcate only with It, partly beeauae of lta unus¬
ual deelgn and partly beeauae of lta unique 20-bit
Interface. (See diagram of PLATO terminal, box nearby.)
A PLATO terminal costs about $4000 and the price
seams to bs going up; $5000 In the next few years is
e popular estimate. But you can't just buy one. You
have to get on the waiting liat, and who ere you, any¬
way? There was a tlaw when almost anybody could buy
Into PLATO, but now that the eystem is unstoppable,
applicants are being acrutlnlxad.
Is it really unstoppable? Educational Tasting
Service, of Princeton, is conducting an elaborate Ef¬
fectiveness Evaluation of the PLATO system, prsstaebly
to decide whether it should live or die (on public
funds). But with so many cermtnala in the field al¬
ready and so many man-yeara already gone into its crea¬
tion snd Che leaking of materials for it (— the ghastly
term "authoring" seems likely to stick), it is hard
to bclitve PLATO could dls. Mot now.
Especially considering that two more systems ere
now being put together: sc Lowry Air Fores Base (Colo¬
rado) and Florida State University. That means there
will be whole other computers of the CDC 6000 series
running the PLATO Monitor and shepherding PLATO mater¬
ials to users at PLATO terminals, unconnected to Ur¬
bana, one for Lowry APB and one in Florida.
And It won’t end there.
Control Date, whose vested interest in the sys¬
tem (though they didn't pay for Its creation) is enor¬
mous, is said to be projecting
PtATO'e audio device permit*
the system to respond to the
user oith a spoken phrase,
•natch of meio, or whateeer
-- in a fraction of a tecond.
The magnetic diek ie forever
turning; compressed air shoots
the read-head to the required
track on the diek for the reply.
The hardware was designed by Bltcer. The soft¬
ware— that is, the underlying computer part , never
mind the contents to b« shown (slao regrettably called
"software” by many h«nd^— wee Initially leee stressed
by Bltrer, but eventually grew under the direction of
others. la particular, sn ex-biologlat named Paul
Tencsar (pron. "Tenter”) created its underlying TUTO*
language. (For sn introduction to computer languages
see p. 1ST and whet comae after.) The TUTTIK language
exists only on PLATO; and PLATO authors may only use
the TUTOR language, Paul Tenczar'i creation.
The TUTOR language can best be understood as
i react ton to CourssvrIter, another CAI language
offered by IBM on its 1500 Instructional Syet —,
Coursawrlter's
to enable non-computer people,
to create drllL-and-practiee Instruction
roughly of the type
Mow, Johnny, what Is 3 A 57
.necrucciooei oyer—,-*.
t e original latent woe unJUe
le, especially teachers, ~
Mi 4 10 Mo. 1
US Good: J »)<?«*- *y.rj.
Obviously, by changing the numbers snd pushing the
kid on types of problems tie hasn't mastered, the
computer can patiently bring students to mastery of
various simple skills, diagnosing weaknesses and
strsaalng the individual student's problems. The
difficulty la that attempting to extend this method
out of the very simple has great pitfalls and may
not even be worthwhile (eee pp. >»\ i$-i$).
0BE MILLION PLATO TERMINALS BY 1980.
Another sign in the wind: Montgomery Herd has one.
Mow, to call the PLATO system a "computet graph¬
ics'' system may seem somewhat odd to people who know
it in another guise, as a eye ten for Computer-Assisted
Instruction (called CAI). But as the author does not
like CAI In general, at least as it's been going—
see p.*5-;*— and rather likes PLATO, 1 prefer to des¬
cribe it as 1 prefer to see It.
Nevertheless, to understand PLATO properly we
had better consider what the peopla have been doing
in terms of what they think they have been doing, and
offer any amendments or restatements later.
"OPTIMIZED FOR CAI"
PLATO stands for "Programmed Logic for Automated
Teaching Operations," snd has been billed (snd sold)
ss a system for automated instruction.
It la, mast PLATO fanciers will tell you, "op¬
timized for instruction." ("Optimized," in computer
talk, means "just what somebody says you need for s
specific purpose.”) As with any system, the leaps of
faith between its basic design premises have become
lit by airport beacons; clearmlnded individuals with
alternate views have difficulty making themselves
understood to some PLATO enthusiasts. But the most
basic underlying feature of the system, INSTANT RES¬
PONSE, cannot be quarreled with. PLATO can respond,
as already mentioned, to a single key-pressing by a
user, almost Instantly; this feature is virtually im¬
possible. say, on IBM systems (but age^b^p. ).
This responsiveness is the system's greatest beauty.
Because of the need for high responsiveness, it
was decided that sll users had to have their partic¬
ular programs ("lessons") running in core at the same
time . That meant there would be no swapping (bringing
in materials from disk memory), which can bring morti¬
fying delays (if a lot of people need it at once); but
It also meant lessons have to be very small . Large
bodies of material, which would have to be moved in
from disk, are not allowed; thus each lesson Is basic¬
ally a little love-neat that must generate its own
action. Hence there is an emphasis on little programs
to respond various ways, rather than text which may be
read in quantity.
Partly because large amounts of text cannot be
shipped to the user, a little PROJECTOR Is In the ter¬
minal. It uses a tiny microfiche, or microfilm sheet,
small enough to fit in the palm of your hand.
If a PLATO author deems it necessary, he requires
for his lesson, not just the use of the keyboard and
plasma screen, bu$4 microfiche as well. The student
must put the microfiche in place when he starts the
lesson; signals from Urbans (or wherever) then Jump
the projected image among 256 different Images, in
response to what the student does.
Now, PLATO people are not doctrinaire about how
their system is to be used. The plasma screen can be
continuously showing little decorations along with
the teaching material. The microfiche could be show¬
ing irrelevant works of art or travel scenes. These
are all facilities at tha option of the PLATO author;
at hla beck and call, if he thinks his program or
lesson needs them. (But it's very bothersome to have
the microfiche made— an important difficulty.)
Every terminal has the screen, the keyboard,
and the projector. Other options may be added, how-
1. The touch panel . This is a transparent
window that goes over the plasma screen
and reports to the main computer whether
it has bean touched, and where. (This
allows illiterates, especially kiddies,
to use the system without typing.)
2. The audio disk. This allows the termi¬
nal to respond with sound, including
canned words, to the student. (It does
not actually synthesize the sound, as
discus fieri on p.DMJl.)
3. Tn* C'merul Lick . JL>t to Sn confused
with Pershing, this is a connector
socket that will send and receive data
from any other device— provided you've
got the right interface. This allows
all kinds of other devices, such as
piano keyboards, to bs used for student
input. Or output (like gum-bell machines.)
Anyway, Couraewritsr was promulgated by IBM
with the 1500 and thus suffered premature standar¬
dization before things had been thought out. IBM
is not to blame for CoursewTltcr’a deficiencies,
they were just trying to make s buck; but heesusc
s lot of scared people believed Coureevrlter wee
the way it had to be, the evolutionary improvement
usual for computer languages didn't have time to
occur. An egregious omission: Coursewrlter did not
allow the author much access to Che computer Itself.
That is, progress written for numerical calculation,
may, could not be brought into instructional mater¬
ials at a sophisticated level.
Tencxar's TUTOR changed all that. It has both
the virtues and defects of being original. Apparently
unlettered in computermen'a controversies snd dogma,
Tenczsr designed s language of great power and speed; &
le utterly strange to computer people . of fere various
brilliant features, and la In bom respects quite
irritating. It looks very simple to the user— but
beyond s few deceptively simple techniques, It ham
to be learned In considerable detail to do anything
Interesting. (See box, "J, If JdW t WtT", cwt r*jO
This talc has, of course, been simplified. Blt¬
zer and Tenczsr did not work alone, but rather were
leaders in a seething cosesunity of dozens of smart
people working like blazes, on the project. It hss
taken some fifteen years of Bitzer'e effort, and tens
of millions of dollars, to get the system where It la
now-- Ready end Working.
Project PLATO now extends far bayond lta original
domain. Originally a fairly tight nucleus at the
Computer-Based Education Research Laboratory C'CERL”)
at the U. of Illinois in Urbana, the comunlcy of PLATO
now sprawls out through its lines to a larger constit¬
uency, the PLATO community of ueere.
(Indeed, this extended Republic of PLATO— the
systems people (zee p. f?) in Urbana, the authors
snd locsis-in-charge throughout the network— consti¬
tute one of the maddest rookeries of computer freaks
in the world. Where else would you find a 14-year-old
systems programmer who's had his Job for two years?
Where else would you see people fall in love over tha
Talkamatlc (a PLATO program which allows you to have
written conversations with people at other terminals,
wherever they may be) only to clash when et last
chey meet In person? Where elec can you play so many
different games with faraway strangers? (See Box.)
Where else can students anywhere in the network sign
into hundreds of different lessons In different sub¬
ject# (most of them Incomplete)? Where else are peo¬
ple working on various different programs for elemen¬
tary statistics, sll to be offered on the some sys-
PLAT0 Is one of the wonders of the world.
Hike O'Brien, a Tolkien fancier, ha*
put the entire Elvish alphabet onto
PLATO a* a special character*-**t.
Here the system give» a fanout naming
to turn back, both in Bngliah and
Elvith .
Hike toy* it intimidate* tnooper*
poking around hi* material.
Unfortunately, there are so many learners, and
so few PLATO terminals, that use of the terminals must
now be fairly strictly controlled. (The eight terminals
ac the University of Illinois st Chicago Circle, st
which moat of these pictures were taken, generally work
sn eight-hour day.) The time was when people could
just walk in, alt down at a terminal and do what they
liked; now, aedly, each usar must have an “account"
and a password.
But the rabble is howling at the gates. Many
professors want to use It to take rote aspects of
teaching off chair backs; snd the computer bias and
students want to play tha PLATO games (sec box) and
tlnkar with an interactive syacea of Its power and
lusclousness. But most of them will have to wait.
PLATO'a services art "free, 1 ’ for now. That la.
If your school has PLATO terminals, and IF it will pay
for the com mun ications lines, THEN the services of
the central computer are "free"— Che National Science
Foundation is bankrolling its operation for a couple
of yeare more. Then, bango, PLATO central aarvlce be¬
comes something that has to be paid for too.
Actually, except for the restriction on quan¬
tities of material chat can reach the student, PLATO
la an extremely general system. Despite the strange
convention of calling sll user programs “lessons";
despite the odd stipulation that all users sre called
either "studerts" or"authors"; and despite being told
by PLATO spokesmen that PLATO is not a general-purpose
eystem; actually, it Is.
Among*t the terminal*, PLATO room,
Cirol* Carpus. I/hat one per eon
ie doing ordinarily ha* no bearing
on the other*, oho could a* u tell
be in Timbuktu a* far a* the main
oatputer it concerned.
Just to give you sn Idea, the coeesii n lcatloo costa
to Urbana for Circle r aapui'i eight terminals ran at
ever $10 .000 a year . But these costs should bs com¬
ing down sharply; it is the pries of tooling up for
whatevar the PLATO future le going to be. Anyway,
the gantral coat of the system comae out to ebout
$1.50 an hour, the same as general tlme-aharlng on e
PDP-10 (aae p. >)£). But that's without paying for
the central computer— another coat which we expect
to go down, however.
This ia all a far cry, of course, from Bitser'a
claim a decade ego that PLATO terminals would cost
only $400. But considering tbs system’s success, we
needn’t dwell on that.
F«rh*pa the reel question la thl»: with ■**»-
machine intercourse of this quality now poaalbla,
can paople's lova for tha ayatam stay Platonic?
They work herd and they play hard on the mighty
PLATO sys tern.
When the Author gets tired of Authoring, or the
Student of Stewing, Just around the corner, a few
keystrokes away, are diversion* and game* to boggle
the Imagination.
You can go to a program ( M 1«t*on ro*e" ) and
look at "the great rosei”-- elaborate curlicue* gen¬
erated by mathematical pattern* that appealed to the
author* of that program; or find, also tueked In rose ,
Conway‘* Came of Life (*ee writeup, p. . end pier
ture series, nearby).
Then there are game* you can play against the
system, like racetrack and blackjack . (These game*
let you win astronomical sixes of money-- play money,
forgotten when you sign off.) Remember, of course,
that you're not really playing against a compute r but
against a specific program , with its quirks and
shortcuts and blind spots.
Then there are game* you play by yourself --
aceually responding resources (see fp. a* it-tt) . which
entice you into trying things out. Tenczar himself
has created two elegant, gem-like lessons, man and
plcto , Which teach you con^uter programing without
ever - saying so. These two programs present the user
with a little picture of a man on the screen, and
show him hiw the little man may be moved around and
made to pick up pictures of balls. From there on
the student nay have his way— and is never told that
he's learning to program a true computer language.
(Though it Is a quite restricted one, dealing ex¬
clusively with little men and their excursions among
balls and falling sticks)
Another charming gama, I don't know by whom, It
cal lad candy factory . Hera too the user may control
the animation of the pictere by what ha typas. Ma¬
chines are teen to manufacture candy, box It and
ship it-- dapanding on what buttons you pres*.
Some games are played between people who sit
together before a single PLATO terminal, often with
teaching Intent. Such game* Include the hop game ,
where Bunny (you) end Frog (your frI end) add the Ir
way along a board with numbered squares. Older chil¬
dren can dig How the West Was (l*2)X ) , which Involves
grouping the numbers you get by chance to try to get
ahead of the other stagecoach.
THE "BIG BOARD" GAMES
Still another category of games, though, asfaits
the adult who craves real excitement. Because PLATO
has so many terminals, all over, there Is a curious
combination of anonymity and Intimacy between users
(— much like the curious Nonexistent Phone Numbers
of Paris; In the French phone system, people calling
the same nonexistent phone number can talk to each
other; strange blindfolded encounters occur et the
Number of The Day, spread by word-of-mouth; sometime*
the»e result In people really getting together...)...
r>Ul
View frem your Nova epaoethip in-
eludes perspective t Hsu of wh ere
you are among billion* of stare;
and your various control*.
at the other guy by specified angles as you stand
among craters). In addition, PLATO offers (not during
working hours) what must be two of the ro*t baroque
space-war games anywhere, empire (eight races (the
Vulcantans, Kllngoni, etc.) seek to control the gal¬
axy) and nova (simulated navigation among millions of
different stars and solar systems, all of which my
be revlsi ted , all of which are different,..)
The navigation part of nova is
already working. To get around
you need instruation; here we
are at the Training Center.
Anyway, the Big Board games of PLATO have exac¬
tly that: a shared list, or "Big Board." showing who
Is playing the specific game.
But you don't have to use your right name.
In this jaunty society of shadows, you pick your
own ncxTi de guerre , or fighting name. This has num¬
erous advantages: the most obvious is that as you Im¬
prove at play, you can shed the Identity In which you
have been humiliated.
The main games with Big Boards are that old
standby, spacewar (rocketshlps wheeling and firing
at each other and sliding around on the screen);
dogfight (biplanes wheeling and firing at each other
and sliding around on the screen), moonwa r (shooting
People who only play PLATO games occasionally
have to sign on.by typing their names Into the big
board. (They often get slaughtered by the regulars).
The regulars-- hah. When they're signed Into the
system, they have merely to jump to a specific game
for their flghtln' names to be pasted on the big
board. A mighty rollcall they make, too-- such great
warriors a* yon Dave, zot, fright pilot, AL 9000,
simpson, doc-, THE RED BARON, The Red Sweater, The
Giant Pud, Fodzilla, tigress, enema salad, Conan,
Siddhartha, wonder pig::!!:, and EXORCIST.
(As those insiders who have automatic sign-on
to Big Boards write programs to do the sign-on, their
arrival in a Big Board game Is often an animated
sign-on. The cutest trick Is THE RED BARON'*; it looks
like this.
THE RED BARON U.-j ...
It works like this. For dogfight , the terminal al¬
ready has stored In its temporary memory, as "char¬
acters," the little pictures ®f airplanes that arc
going to buzz around the screen. So the Beron just
follow* his name with the code for that Special char¬
acter.)
One last point. No longer can you sign on with
an obscenity: a little obscenity-checking program
looks for the usual expletives, in case visitors or
other priggish folk might be tooking. But of course
thla is easy to circumvent by putting periods between
the letters of your nasty word, or something similarly
deceptive to the poor prograig.
Tftt ^tpdTD’^e WPlato
The PLATO keyboard.
What looke odd and arbitrary to you is believed by devout Platoniate
to be divinely ordained.'
PLATO IV- STANDARD KEYBOARD
■D®®ii]EH 0000 ranfflnH
□■ 0000000000 BBOSB
■■HfflEESEBSSmmHM
TO MOVE BETWEEN LESSONS, the basic action ie to hold down SHIP? and
preet STOP. (For further complication* see Ine-And-Oute diagram.)
TO MOVE UTTBIH A LESSON, basic actions are NEXT (to go forward or
tell the system it’s its turn; BACK, which sometime return* you to
earlier points in the sequence of your lesson; and six step-out-of-line
options, by which the author may permit the user to sidestep to ex¬
planations, enrichment material, or things out of sequence.
FUTO'i IHPUC.it STKyd-TURe -r 'FAMTit (J«c p. )
(iS- »* u»«- I'wi* f»f|.T> ct iO T*»>| **«. '■■\ Ur k»m4s ,4 kt
-Wj
K»1bru.[; o fr«vi»us cyeA.^ «<r ppj.W,
V . WGU IQ 06 <2 003X0 BAOUSnCS.
tn which NEXT and BACK Would be the forward and back control*. and
the other six would represent Help for the Confused, a "Lab” allowing
experiments, and additional Data the student decides he needs. The
with Shifts singly provided a second option of each type*
the author night use these, however, was hie cun affair.
”TEBM” evidently was for when students wanted things Looked Up: bu
pressing TEOt and typing the unknown word, the student would get a
da/instion. AAS suggested that it might also be used when the
etudent was allowed the option of being told the answer.
OU ‘ r ^E.A.D Z.X.C. They allow the student to move
waora, draw, point directions, etc. Unfortunate confusion ensues
•np^Zvf 7°™ ^ ** ^ Uftj ^ ^ rcrmdn ^ (aa *« Mi
MASfaZIowa the student to correct his input; COPT helps edit and
SUP and SUB alia; superscripts and subscripts;
JW *i. CK> U a 'P*™ 1 i hift ***’ 9° in e inl ° whatever special
font i, currently stored on the terminal. I have no inkling of what
txttls squars mans.
IS irBems.T© t*ot?
"A tutor who tooted the flute
Tried to tutor two tutors to toot.
But he asked through hie snoot:
is it better to toot
Or to tutor two tutors to toot?"
Polk thing
The TUTOR language grew out of drill-and-
practlce, for which it haa a coemand specifying
where a atudent'a answer is to appear on the
screen. This is the “arrow* comand. The lan¬
guage has a strange scanning structure built
around this "arrow* command, much as the TRAC
Language (see pp. 10-21) has a scanning struc¬
ture built around parentheses and conus. Be¬
ginners don't need to understand the scan and
the arrow coemand, but journeymen do.
TENCZAR'S CONCEPT OP A CONCEPT
Much has been made of TUTOR'S facility
for "analyzing the content" of what students
type in. Actuaily, of course, the computer
does not “understand" what the student saya
(see "Artificial Intelligence " i* - •’(),
but rather offers certain efficient tricks to
the person using TUTOR to prepare presenta¬
tional materials.
Basically, TUTOR’S "concept" facility
reduce^ every input word to a 60-bit code .
The technique of reduction (called a "hashing
function") supposedly substitutes for any
word of any language a code of 60 bits (see
"Binary Patterns," p. 33), which means the
program in TUTOR can rapidly test a student's
input for numerous different possible things.
(The power of this technique will be readily
recognized by computer people; unfortunately
there is no room to explain it further here.)
Thus a TUTOR program may contain “concept
searches" that test whether a student types
either a desired response or numerous alter¬
natives. While it may be strange to call
this a "concept," it is a powerful technique.
Paul Tenczar's TUTOR language, the pro¬
graming language inside PLATO, is like any
other programming language (see pp. 15-31}j
intricate, and unlike its results. That is,
a program bears no more resemblance to what
it does than the word "cow" looks like a cow.
PLATO is a system for canned presentations
that respond to the student. Students need
not know TUTOR. Anyone out to prepare such
presentations must learn it, however; end the
attempt has discouraged many.
Tenczar is a former biologist, and had no
preconceptions from coeputer orthodoxy to bind
him in the design of TUTOR. Thus the lan¬
guage is very original. There is only room
to raise the following points:
To learn the first steps in TUTOR— how
to set up drill-and-prectlce lessons, for in¬
stance— is unusually easy.
To do anything copies, however, requires
you to learn the bulk of the TUTOR language.
Thus when people say TUTOR is "easy," they
mean those first steps.
TUTOR is not Extensible, like, say, TRAC
Language (see pp. 16-10) or CRASS (see p.**^ ) .
That is, a progrxmer cannot customize the
language with new compound functions of hie
own making. Steps are being taken to correct
this; meanwhile, it is said that the Urbans
people can be persuaded to put in new coe man d■
others want for, e.g., chocolate chip cookies.
Ttt-r Gtrztc&'Y'l'Z. V -
TrtfcCAVfc OF
TWO.
kr-r .
fl¥To Tucr uiFj)
•t C.O-H ivt)
H^kttr ON TM C WHL
lM\c h nc.r««.«•.
8-r P'fk-i* k*«r
i-»Wi Kg V: Kcy)- 11 *
T ( o*.l) -
J7*wi f ••■
You esn read the standard-size lettering off
the screen et SIX FEET— even though it's
NO BIGGER THAN PICA TYPE. Fantastic.
The internal circuitry that draw* on the screen
Is highly capable. Receiving a 20-blt code,
the terminal itself deciphers It n—
A LINE ON THE SCREEN, or
TWO STANDARD CHARACTERS ON THE SCREEN
from its FIXED character memory, or
TWO SPECIAL CHARACTERS ON THE SCREEN
from Its CHANGEABLE character memory
(which can be Loaded with Russian,
Armenian, katakana, Cherokee or what¬
ever— even little pictures — at the
start of the lesson), or
A COMMAND TO THE MICROFICHE PROJECTOR, or
A COMMAND TO THE AUDIO PLAYER, or
A COMMAND TO WHATEVER'S IN THE GENERAL JACK.
Note that all lines and characters for the plasma
screen can be turned on (oTange on black) or
off (black on orange).
PLATO'S HANDY KEYBOARD is
flexible cable, can be t
in your lap.
AUTHOR'* NATO -SHCE w)
o</t«j jiti sjftK.
It tmtr. 'M<s,' r »*« V.)
>50
three-dimensional line displays
*
1 *
A‘W>)
et*,
hW
t
So far we've discussed the two-dimensional
subroutining displays- However, things do not
by any means stop there. A number of people
in the early days experimented with technique*
for drawing line pictures by program; the ear¬
liest of these used plotters , output devices that
let the program draw with a pen. But interest
soon grew in the possibility of interactive three-
dimensional displays on screens. Johnson's
Sketchpad 4 did this entirely by program. But
as night follows day. people set about putting
these techniques into hardware , creating devices
that would automatically show things in three-
dimensional views-- allowing the viewer to
rotate views of nonexistent objects as if they
were on unseen turntables .
The views wc are talking about, now, co
sist of bright lines on a dark field, and so the
"objects" wc arc talking about are called "wire¬
frame" objects-- they could effectively be made
of welded wire. But now wc do not have to
build them physically to see them.
Actually Adage had a tremendous lead in
this field, but they let it slip for some reason,
and have now lost II to two firms: Evans and
Sutherland on the high end, Vector General on
the low end. (But of course things keep chan¬
ging.)
The Evans and Sutherland Computer Com¬
pany was founded In 1966 by Ivan Sutherland,
creator of the masterful Sketchpad system, and
David Evans, chairman of computer science at
the University of Utah. (For a time both held
appointments at U 2 at the same time, but now
both have left the university to devote full time
to their dream factory in Salt Lake City.)
Their first producl was an extraordinary
piece of hardware called the LDS-1, which they
said innocently stood for Line Drawing System.
(To anybody from Utah, however, LDS means
Latter-Day-Saint, and don't you forget it. Evans,
indeed. is a Mormon, but I’ve been told it may
have been Sutherland's sense of humor that
chose the acronym.)
It should be pointed out that a special ad¬
vantage of digital perspective calculation is that
viewed coordinates can be read back by the com¬
puter, and serve as new data, if you go for
that sort of thing.
Basically a three-dimensional system of
this type stores the lines as coordinates In threes:
endpoints of lines in a mythical three-dimensional
space. Each point’s location in the space is told
by three numbers (example showing a house
may be seen on p. ): a line in a space is
represented in the data structure by two such
points, and a code or something tying them to¬
gether.
u
The second program follower in such a
device behaves much as it does in the 2D system,
but with certain additions. Like the 2D system,
it proceeds down its own program one step at
a time. Like the 2D system, it finds in its
program the coordinates of a line to display and
creates electronic signals representing its end¬
points. But it does not display these directly,
since these are three-dimensional coordinates.
Instead it routes these signals to what we may
call a view calculator , a particular piece of hard¬
ware that has been primed with the angle from
which you want to view the object. This view
calculator, automatically and by mysterious means
which vary among machines, produces the view,
and its signals go to the screen.
Let's say we want to display a point. The
display's program follower pulls three numbers
from Us display list and notes the code that says
it's a spatial point and not the end of a line.
These three numbers slide on into the view cal¬
culator, already primed with the angle of rota¬
tion: and the view calculators figgers where on
the screen that point should be displayed . The
coordinates for the screen-- telling where the
point goes in the desired picture-- go to the
screen controller, and the point is brightened.
How are these coordinates calculated?
Well, some commercial units do it electronically
("in analog") and some do it symbolically ("in
digital"). The result is the same.
flf you want the equations for this, they're
in the Newman and Sproull book.)
Then how does the view calculator handle
a line? Same thing.
The program follower pulls three numbers
from Us display list and notes the code that says
it’s a line, so it lakes three more. Then the
view coordinates of both points are calculated
and fed to the screen controller. The screen
controller now has two points on its screen—
so it draws a line between them
The first device of this type was. I think,
the so-called kludge (pron. "Klooj"— computer slang
for a ridiculous machine, but in this case applied
affectionately) built at MIT's Electronic Systems
Laboratory in the early sixties. This device was
a one-of-a-kind, built out of DEC circuit cards and
hooking to a bigger machine. The ESL Kludge showed
vividly how good It was to have instantaneous view
calculation under a user's control.
The first of these systems to be offered
commercially, 1 believe, was the "Adage Display,"
made by Adage, Inc. of Boston, which uaed their
unusual Ambilog computer (see p. ^3) to rotate
objects on the screen. 1 vaguely recall that it
cost about $80,000 with computer but without ac¬
cessories .
INTERACTIVE ROTATION
3D scraans— as Ida from their fun and excits-
mant— allow people to understand and work with
complex JD structures without having to build them
physically.
The underetending, however, comes from being
able to turn and manipulate the structure on the
screen. If you can't turn it you cen't really
perceive the 3D structure, because the arrangement
of lines could be anything.
However, system ,n<l the Vector
General and the Evans mr.-Tl md devices allow
you to turn things on the screen ae easily as if
they were on turntables behind a pane of glass.
That's how you see, you see.
This Interaction is what make* computer dis¬
play augur a new era for mankind, if we're lucky.
(It’s also why we use the term computer display
in this book, rather than "computer graphics,"
Since people who make computers draw with pens are
also doing "computer graphics"— a related activity,
but not one to change the world.)
-V— V-
The Adage Display is isometric . meaning
that lines do not get shorter as they get farther
away or longer as they get closer. While this
is marvelously impressive, most people want
real perspective: and it was this that Evans vd
Sutherland set about to make available in real
time, i.e., in direct response to the viewer's
actions.
The LDS-1. weighing in at half a million
dollars or so, buckled to the PDP-10, a big
36-bit computer from DEC (see p. 4 O ). Its
view calculator worked symbolically (digitally),
and thus could work to the higher precision
necessary for true perspective calculation.
Among the exciting demonstrations that
you can see sitting at an LDS-1 are a map of
the United States you can zoom in on, bringing
you in to a map of New Jersey, then Atlantic
City, then a specific intersection, all in one
smooth continuous motion. Also a simulated
landing on the flight deck of an aircraft carrier
-- with you flying the airplane, so you can
go over it, to the side, into the drink or straight
at the carrier. In all cases the ghostly ship
will move, turn and change perspective on the
screen as if somehow it were really there.
Several LDS-ls were sold.
Meanwhile a little new firm of young guys
in Southern California, Vector General, came up
with a line of terminals like the Adage line, ex¬
cept that they could buckle to the 16-bit minicom¬
puter of your choice. (In practice most of them
have been attached to PDP-lls; see p. HL.)
The Vector General display is isometric,
and makes its calculations in analog, like the
Adage Display. It has been very successful a-
mong both universities and private corporations.
In addition, a highly interactive and well-
designed language is available for the creation
of data structures representing 3D objects, as
well as for general-purpose programming and the
creation of whole environments. And it's free
to individuals or companies that have Vector
General displays attached to PDP-lls. (See
"Coup de GRASS," p.>\3/.)
But wait. Evans and Sutherland has now
dropped the LDS-1 and given us-- no. not LDS-2,
but something called The Picture System— also
built onto the PDP-11, but this one works sym¬
bolically (digitally) and in full perspective. The
price starts at eighty grand.
Since the Picture System works out of the
PDP-11 core memory, the commands it follows
are 16 bits long, since that's the size of a slot
in PDP-11 core. But wail. They've designed
the thing to convert to 36 bits , so that coordin¬
ates are moved to a private store or buffer be¬
tween the program follower and the display.
This means the display can zoom and zip around
in the scene without bothering the computer.
UNFORTUNATELY, just to get through the basics,
there is only room to discuss stick-figure
graphic display here. But curved surfaces
may also be depicted, though usually not inter-
actively. See below, and pp. 5^3?
h Wit,
taf flr.
Drawing by Ruth Weiss' BE VISION program,
done st Bell Laboratories, old-slxtles.
(©Walt Disney Productions.)
This program represented truly curved
surfaces in its data structure, as
"quadric surfaces"— that is, invol¬
ving powers of two in the math— and
calculated the visible lines tangent to
the edges from the viewpoint, thus draw¬
ing the edges. Removing the hidden
parts of the curves is of course one of
the greatest problems. (From Ruth A.
Weiss, "BE VISION." JACM Apr 66. 194-
204, p. 201.'
z.
Ik
*
I
Another important feature of The Picture
System: it will do, not just ordinary perspective,
out such weird view calculations as wideangle
barrel distortion, pincushion distortion and
similar stuff.
Courtesy
V. of Utah
The rules of perspective have been under¬
stood since the Renaissance, in olden computer
times (up till about 1965) people used to do
three-dimensional view calculation by angles
relative to a three-dimensional data structure.
Then Larry Roberts at MIT noted that there was
a more appropriate mathematical method. Long
moldering in obscure texts. The idea is this:
if you add an extra dimension to the data , it's
easier to program. It's easier because it be¬
comes a simple matrix multiplication, which has
no commonsense explanation but is important to
mathematicians.
SO that means that to calculate views of
three-dimensional objects, the most usual way
is now to add that extra dimension. Instead of
having a point in space whose position is 36-24-
36 (in some set of three-dimensional coordinates),
another arbitrary number is added to make it,
say. 36-24-36-1.
It seems that in the mathematics of multiple
dimensions, it comes out simpler that way. In¬
deed, from a mathematical point of view the new
improved dimension is just like the other three .
For this reason, such an augmented system of
coordinates is called homogeneous coordinates .
Like homogenized milk, Ihe additional coordinate
is just stirred in with the rest, and out comes
your desired view calculation. (The formulas
are to be found in Newman and Sprouil. Princi ¬
ples of Interactive Computer Graphics , McGraw.
$15, your basic text on the subject.)
At any rate the additional coordinate is
often referred to, incorrectly, as the "homogen¬
eous coordinate." They're all homogeneous,
which is why it works.
M 31
kW (©op k GRASS
impudent and plucky Tom DeFanti was an assist¬
ant professor at 24. This in part because he has
created one of the world's hottest 3D graphics lang¬
uages, which he calls CRASS. (He says it stands for
CRAphics Symbiosis System— also, he says, it Turns
You On.)
Tow’s GRASS language is an excellent beginner's
computer language for two reasons: first, it is easi¬
ly taught to beginners, and second, it is about things
of interest to beginners, i.e., pictures and graphical
manipulation on screens. (But compare the three be¬
ginners' languages presented briefly on pp. 16-25.)
A prototype for the system was developed at Ohio
State, on a project directed by artist Charles Csuri.
Tom had a free hand, though, and the language design
is his; but much of the specific coding was done by
Gerry Moersdorf, and the graphics algorithms and ro¬
tation were programed by Manfred Knemeyer. Inspira¬
tion was furnished by Maynard E. Sensenbrenner.
GRASS runs on the PDP-11, a splendid minicomputer
(Ton's is shown on p. 36) and is specifically designed
for the control of three-dimensional stick-figure dis¬
plays on the Vector General display system (see p.
DM \0 ). But a lot of people have wrestled with these
matters and not done as well. Let's consider:
H. The language is extensible , meaning that the
user may create new commands in the language « programs .
These conroands, however, may be used in later programs
as if they were built into the language itself.
I. The system is completely general-purpose. Many
graphics languages are not, being restricted only to
their original purpose. This is more difficult, but oh,
so much more worthwhile.
3. ITS DEEP GENERALITY. Things should be versatile,
and able to be tied together in many different ways. This is
what we mean by "generality;'' and this kind of generality can
make a system very powerful. (The term in mathematics is
"elegance.") As is said on the other side of the book, com -
pllcatedness is not generality or goodness or power, but a
sign of the designer's shallowness.
Anyway, GRABS has this kind of generality. It has a
great number of facilities, growing weekly, and they all tie
together in clear and predictable ways, without exceptions.
Rather than create special functions which cannot be tied to¬
gether, Young Doctor DeFanti has chosen instead to make the
separate desirable functions part of a simple and clear lan¬
guage. (A note to you elegant types: GRASS is fully recursive
As a nice example, Dan Sandin (see p.J>h&) wrote a program to
display Peano lines that was under forty GRASS instructions
long. It is also astonishingly reversible: you can watch it
uncreate the Peano line, straightening itself backward.)
In the more usual sense, DeFanti's language is not
the 'most advanced'; there are more powerful 3D systems
than the Vector General (the LDS-1, see p.J>M)o, offers
true perspective), more elegant user-level languages
(see TRAC Language and APL, other side), true halftone
(the Watkins Box); yet his achievement on close examina¬
tion is extraordinary. Never mind his age, the more eso¬
teric features of his system (full recursiveness, etc.)
or the fact that he does not seem to have made one mis¬
take, which is infuriating. Consider only this: TOM DE¬
FANTI 'S 'GRASS' LANGUAGE IS PERHAPS THE ONLY SYSTEM THAT
CAN BE TAUGHT IN A FEW HOURS TO COMPUTER-NAIVE BEGINNERS
THAT PERMITS FULL THREE-DIMENSIONAL ANIMATED INTERACTIVE
GRAPHICS WITH TREE-STRUCTURED DATA.
1. ITS CLEAR SIMPLICITY. Tom believes computers
are for everybody; he is not a high priest bent on mak¬
ing things obscure (see "Cybercrud," p. 8). Thus he
made his language as sensible, clear and easy to learn
as possible. Tom likes to stress the concept of "habit¬
ability" (a term of W.C.Watt), meaning the coziness of a
2. ITS GENERALITY. Refining and condensing the
basic ideas of a system is the hardest part of the de¬
sign. DeFanti made several interesting decisions.
A. The internal form of the language is
ASCII code (see p. ). In other words, you f»*i
read programs in their final GRASS form.
Ton DePanti
B. For a three-dimensional system such
as the Vector General, the main form of data
structure is the three - dimensional object — a
list of points and lines in space. This is the
form of data GRASS uses for most purposes.
C. In the design of such a system you
want larger 3D objects to be buildable out of
smaller ones. This ingslies arranging data
in tree structures (see p. I 1 ) ) . You also
want to be able to make things do compound mo¬
tions on the screen— for example, showing an
airplane flying around on the screen with its
propellor spinning; this too implies a tree struc¬
ture. There are some programmers who would use
different tree structures for both objects group¬
ed together and for movements grouped together;
Ten uses one.
D. Objects shown on Tom's system can also
appear to move on complicated paths through three-
dimensional space. In Tom's system, such a path is
merely another object . It seems obvious when you
say it, yet this kind of simple generality is ex¬
actly what many programmers seem to avoid. (Note:
this facility is a generalization of Baecker's p-
curve; see p.!M5).
E. Input devices are completely arbitrary and
programmable. What happens on the screen can be con¬
trolled by anything— any variable (see p. J&» ) in
the programming language. In other words, DeFanti
has decoupled the screen from any particular form of
control, allowing user programs to make the connect¬
ion between controls and consequences. This means
that, using Tom's language, it is comparatively easy
to build complex custom controls for any function.
(This is discussed under "Fantics,"* p-^Jj-5i.)
F. The language has string functions that allow
text handling. Since the language may also use con¬
versational terminals, it is eminently suited for
"good-guy" interactive systems for naive users, as
described on pp. 12-13.
G. Tom’s language is interpretive, like TRAC
Language (see p. 30). That means it is "slow" in terms
of the number of machine cycles required for it to do
each operation. However, DeFanti has added a "com¬
pile" feature to the language, so that for long macros
(sections of program) that have to run repetitively, moi
efficient compiled versions of the macros may be gene¬
rated.
I coined the term fantics , for the art and technology of
showing things, long before I ever heard of Tom DeFanti,
and I am not about to change it just because he is now my
70m UM OF fewermwus
oj>V 6 sj> attorn j>/snw
Much of today's impetus for 3D computer
display is coming from the field of chemistry.
University chemistry departments are buying
equipment like the Evans & Sutherland LDS-1,
the Adage and the Vector General.
Tom DeFanti. Shove part
of hemoglobin molecule.
Data structure from
Richard J. Feldmarin, NIH.
Why?
Because chemistry is increasingly invol¬
ved with complex three-dimensional structures.
Crystals, long folding chain molecules, minus¬
cule forces acting on structures whose shape
determines the outcome. Organic molecules
that involve thousands of atoms. and whose
complex folded structure exposes only certain
key features. And so on.
The Vector General display illustrated
here and there on these pages belongs to the
Department of Chemistry, University of Illinois
at Chicago Circle.
Bouknight & Kelley (see p.
Tha bast Feature of alls it's currently available.
PDP-11 ownere— even without Vector General dieplaya —
may inquire of: Tom DePanti, Doctor of Arte Program, Ulcc,
Chicago It 60600. '
so many have atumbled and failed?
I just learn frees other people's
cheerily.
mistakes,"
Frof. DePanti
‘>n the eyetem.
MISCELLANY:
Coupling his system with that of Dan Sandin (p. dm 9 )
has created the "Circle Graphics Habitat," described on p.
I hope I'm around long enough to write the GRASS lan¬
guage manual.
(DeFanti's GRASS is an ideal language for sooething like
the 3D Thinkertoy, described on p.^Sb . However, it doesn’t
have any provision for the storage of large complex data
structures, so the hard part would actually be working out an
adequate storage data structure and storage macros within
GRASS'S use of the DEC file system.)
SCREEN CONTROLS
The great thing about CRT displays is that they can be
used to control things b£ manipulation of picture;. Instead
of moving buttons or levers, you can seize parts of the pic¬
ture with the light-pen and move some part of the picture.
The computer, sensing the choice or adjustment you have made,
can then perform whatever operations you have directed.
Some samples:
T«CK.AOJTAr
= 4 *.
a
VotOMt
Tout
VUVE
co-nxeu
l°e%
or.
The design of screen controls— easy-to-use, clear and
simple controls for everything— is one of the frontiers of
computer graphics. (See "Panties," p.'fJ;5/o
DIMENSIONAL FLIP
3D scopes are about the best we've got-- so what do
we do about multidimensional phenomena?
One very good solution is to show a selection of thret
dimensions at a time, and provide for easy "flip" from one
dimension to another— so that instead of looking at some¬
thing on demensions A, B and C you are looking at it on di¬
mensions A, B and X.
For example, suppose you're a sociologist looking at
measurements of various traits among a group of people.
It's a cloud of dots in three dimensions— whatever three
dimensions you're looking at. Some could be: age, height,
weight, sex, ethnic background, premarital experience, ed¬
ucation... etc.
You view this cloud of dots, say, according to age,
weight and ethnic background. That means you can rotate it
around and see how many people in the group are what.
Using dimensional flip , however, you can change the
view as follows: rotate the box-frame till it becomes a
square to your eye. Then you hit the control that makes
the unseen dimension “flip" to another dimension that in¬
terests you. The cloud still looks the same— until you
rotate it, and the third dimension is now "premarital ex¬
perience.” So you can quickly get a view of how popula¬
tions are really divided up. (Note to sociologists: this
same operation, with stretching and clipping, provides a
visual technique for "partialing” operations of the
Lazarsfeld type.)
You can make a character change expression on a 3D
scope by making his mouth a twisted wire that can be
rotated between ’’frown" and "smile" positions. The
trick is the shape of the wire.
NOW GUESS WHAT; DeFanti's GRASS language is the best lan¬
guage I know of for doing all the above things.
81
friend and
#*\f i not fMcfW
A Series of Heviow Articles
Computer Decisions Magazine.
WHERE TO GET IT
Conpu
3D halftone systems are now available to movie
of source*. It tend* to coat a lot of money,
rcd'wlth normal Hollywood production expense*, it
SALES OF MACHINES.
Computer Image Corporati
for sale. See p. DM 39.
Evans and Sutherland Computer Corpo
offers the Watkins Box, a rea
us 1 or the Watkin* Method (see
also Gouraud pseudo-cur'
It costs about $500,000 anti
larRC computer; see p. 40).
tlon , Salt
time dlspl
ext page)
shading (see p
attaches to a
e City,
DM 37).
TDP-10
General Electric, Syracuse, offers three-dimensional scene
synthesis like that at the bottom of this page. Every
job Is custom. It’s done on videotape through programs
running on a smallish computer. Production costa,
after your data structures are all In, could run as
little as hundreds of dollars per minute (rather than
thousands) .
Contact; Charles P. Venus, General Electric Co.,
Building 3. Syracuse NY 13201, 315/456-3552. (Given
In detail because harder to reach than these others.)
Computer Visuals, Inc., Elmsford, NY. Offer more detail
than Gli system, and go straight to film without video.
More expensive: probable costs run in the thousands of
dollars per minute. Again, every job Is custom.
Contact: Nat C. Myers, president.
Dolphin Productions, NYC, has several Computer Image machines,
but their president, Allen Stanley, is interested in
eve rythlng.
Computer Image Corp., Denver and Hollywood, also offers servic
on their machines. On occasion they have been willing
to back film-makers, reportedly on a 50-50 basis. Their
president, Lee Harrison III, Is a swell fella.
Author's note . These articles were
written for Computer Decisions magazine, and
reflect the results of a lot of phone calls they
paid for. The first of these articles was pub¬
lished in 1971. The others have not been
previously published, as the editors and 1
were never able to get together on quite what
they wanted.
This is, to my knowledge, the only
existing collection and summary of computer
half-tone systems to date, and in some cases
the articles reveal more about the systems
than has been published anywhere. Sur¬
prisingly, even two years later they do not
seem out of date.
However, due to the editorial style of
Computer Decisions , and my own, this has all
come out extremely condensed, and phrased
in breezy and humorous ways not ordinarily
considered acceptable for serious technical
reviews. The hope is that they will supply
orientation to the browser, deeper insights to
the technically-minded, and further directions
for them as wants to pursue.
FIRST ARTICLE
General idea of 3-D halftone.
Polygon Systems.
halftone image
synthesis
My thanks to the publishers of Computer
Decisions and its editor, Robert C. Haavind,
for their encouragement, phone money and
permission to reprint this.
There are more ways than one
to produce shaded pictures with computer/.
Here are the methods
of the 'polygon school.’
b> Theodor H. Nelson
Tile Nelson Organization
To most people in the computer field, “computer
graphics ’ means line drawing—systems and programs
for mapmaking, pipe layout, automobile and aircraft
design, or any other activity where a diagram may
help. Using line-drawing programs and equipment,
designers may create line drawings on fast-re*.ponding
graphic screens, reworking their ideas until satisfied;
(he system then disgorges polished drawings and speci¬
fications for the designer's real intent, something else
that is to be made or done. But it is possible for a
picture itself—instructive, interesting or pretty—to be
the goal. In that case we will often want pictures that
look like things instead of wires. A picture that is not
all black and while we call "halftone.”
With much secrecy and a slow start, computer
halftone systems are now being built all over. The
methods are extremely different from one another;
only the outputs arc similar. Some exist in software,
some have already been built into special hardware.
These systems have many potential uses for visualiza¬
tion, animation and new kinds of photography, in
art, scholarship, motion pictures and TV; for visual¬
izing worlds lost and imagined, equipment yet unbuilt,
the responsiveness of aircraft. It may not be long
until moviemakers can buy different brands of picture
synthesizer, just as musicians choose today among
Moog. BucIila and arp music synthesizers. But none
is in pnxluction yet. This is an attempt to review the
coming apparatuses of apparition.
Not only is the field of halftone one of the most
exciting in computing; it is also one of the nuttiest and
most secretive. For instance, at one time a firm that
was supposedly marketing its halftone system declared
the present author persona non grata and not to be
communicated with in any way. though information
was freely available to others. "I don’t think it’s
necessarily paranoia." says Rod Rougelot of General
Electric. "A lot of guys started about the same time,
and proceeded in a heads-down manner." It took a
special kind of initiative to head off in that direction
with no external provocation. “All those heavy cats
from akpa and MIT were saying in the sixties I could
never do a Mickey Mouse,” says Lee Harrison ill of
Computer Image “But I’m not that kind of researcher.
I talk to Ihc Lord."
The systems' stories are as different as the systems
themselves. General Electric’s system grew out of
cockpit displays for blind flying. The system of Penn¬
sylvania Research Associates began with terrain and
radar modelling. The system of magi (Mathematical
Applications Group, Inc.) began with the study of
radiation hazards in battlefield machinery. Two system
families, that of Computer Image Inc. and my own
Fantasm, were designed from the beginning for movie¬
making, especially “special effects" and puppeieering.
The most poignant tale may be that of Lee Harrison,
whose struggling family was warmed through cold
winters by the tubes of their analog computer
Halftones in two dimensions
Two-dimensional computer halftone is not new.
Halftone pictures convened from photographs have
often been printed out on line primers, either for fun
(nudes often turn up at big installations), or in con¬
nection with some scientific problem, such as analyzing
chromosomes. Kenneth C. Knowlion, It Bell Labora¬
tories, has executed some well-known photo conver¬
sions making pictures into huge grids of tiny whimsical
symbols having different grey-values.
Various other systems have allowed users to create
their own original 2-D pictures. But the natural temp¬
tation is to want the computer really to make picture*.
Why not have the computer produce a photographic
picture directly from the 3-D representation of objects?
Computers don’t do this by nature, any more than
they do anything else by nature, so haw it may be
done by computer is very interesting. The problem is
also interesting because of its intuitive nature. Visions
of scenes in space are around us constantly, and we
intuitively understand the geometry of outlines and
light. As 3-D work progresses large problems are being
overcome. The famed "hidden line problem," for ex¬
ample, was misleadingly couched, since the problem
is not Finding what lines arc hidden, but what surfaces
are in front!
Computer graphics the ordinary way
Th* computer, as penman, draws lines
from a list stored in core memory. In i
three-dimensional system, the basic
list of 3-D coordinates is converted
to a list representing a particular
view: the result looks
like a wire frame.
3-D halftone system
Today'5 new procedures can use the
same data to make a realistic shaded
or halftone picture. The visible parts
of the obiects are ascertained by
programs or special hardware,
using the same 3 D coordinates as in
the ordinary systems. These visible
parts are then shaded according
to the appropriate color information.
The senes of shading-points makes the
picture on an output device.
12
COMPUTER DECISIONS
MAY 1971
13
General Electric will
system. These are from a I
the film was to explain to
function. Rather than use
stand how the sections wou
so on. For exposition of
make movies and videotapes for you with their pictorial synthesis
beautiful (really beautiful ) film they did for NASA. The point of
i everybody how a proposed space laboratory would be'built and would
1 diagrams, they enac ted it in the GE system, so viewer* could under-
ild be delivered and fit together, how the antennas would unfold and
that kind, nothing beats this kind of enactment.
Wc must draw on ihi* undemanding of scene* to
figure out how to mike picture*, for there is no
mathematically elegant or preferable approach Scene*
■re geometrically nch. and Ihu* many different tech¬
nique* may be used to extract picture* from them
The*e technique* may look at planar structure*. *patial
interconnection* relative edge* of intersection* or
anything else you can define and process I prefer to
think of computer halftone a* like trick photography
or the kind done in Hollywood: a variety of tech¬
nique* can he combined in various way* A* in trick
photography, the number of touche* and enhance¬
ment! that you add generally determine* how good
it will look, regardless of what system you begin with.
The simplest systems art those that depict object*
made of polygons—that is. plane* with straight edges.
We will discuss such system* in the present installment.
The wild polygon w>«d*r
At least two companies are building image system*
lhal will behave and respond like onroshmg reality.
Such a system, hooked to cockpit-like controls, can
show a trainee pilot the delicate and precipitous results
ol what he does Realistic action, rather than surface
detail, i* crucial
The techniques of action polygon halftone were
originally developed by General Electric, of Syracuse,
N Y., and are now also under development at Link
Division of Singer Company (maker* of the beloved
pilot trainer and its progeny). Basically »uch system*
operate upon the scan-lines that crisscross a television
screen, switching the color of the running scan a* it
crosses from polygon to polygon.
The action polygon school—GE and Link—take*
a curious but effective approach to halftone TV: their
"environments'' are composed entirely of convex object*
made entirely of convex polygon* To use only convex
objects (no dents) means that one object may be in
front of another or vice versa, but never both. (An
object with apparent indentations, such a* an airplane,
ha* to be made out of a group of convex object* Tying
together.) To use only convex polygons (noichlcss)
makes it easy for the system to decide, at a given
instant, whether the *can is crossing the polygon or not.
The edge-box report* summed into the facet boxes,
each of which was set to respond to a particular
combination of left-right, ahove-helow reports. At the
instant all the facet's edge boxes replied in the proper
preset combination, the facet box signalled lhat it*
own facet was heing crossed by the scan-line When
more than one lacet-box responded, the one nearest
the viewpoint hid its color pled to the screen.
Now Rnugelot's group i* replacing Ihc old NASA
*y*tcm by a new naxa system, which works on entirely
different principles, but keeps the vector calculator
The old one could show scenes with up to 240 edges;
the new nasa system will at least double that. GE'i new
method is already operational on smaller research fa¬
cilities. They don't tell what it is, but basically it in¬
volve* sorting by distance Supposedly the son method
ii good enough to make the old edge boxes obsolete
The Link group claims competitive performance for
their system, which will go lo black-and-white thou¬
sand-line TV. They say their system is different, belter.
Campus of Fooled U. {GE)
Mb *5
•ady to competa (Gary Watkins. Utah)
The method of Gary Watkins is the result of a
profound search at the University of Utah for the
method—a polygon technique fast enough for real¬
time enactment, but cheaper than the GE-type systems
and not subject to the convexity restrictions. They seem
to have found it.
Each video scan of the scene result* in a "slice''
through surfaces in the scene The two nearest surfaces
arc continuously compared to see which is closer, as
if by [wo rulers. The instant x new surface becomes the
Dearer one, the system makes it the visible one. TV
nearest surface always shows, down to the precise
instant two surfaces cross.
This work evolved in part from GE's work in the
fifties with a "ground plane simulator,” a system that
would show a correct representation of the ground's
position, dipping and rotating, to the pilot of an air¬
craft in fog or night In 1963 the General Electric
group, under Rod Rougelol, worked out for nasa the
design of an "environment simulator"—a device that
would simulate the appearance and performance of
any equipment. This is row called the "old nasa sys¬
tem. ' It permitted the user—seated before a color TV
screen—to work controls for an imaginary aircraft or
spacecraft, and sec roughly what the pilot of the craft
would see. flying in real lime through a breathtaking
color scene. Films made on this machine have been
stunning. Imaginary cities, roller coasters and aerial
dogfights are among the visions that can be presented.
General Electric s okl nasa method is fairly weird
if not mischievous. The earlier "ground plane simu¬
lator" had shown an edge 1 the horizon) digitally dis¬
played on a ert; the system was extended to many
edges, and the logical analysis of areas between them.
Wylie-Romney: shoot the works
The Wylie-Romney method, disclosed in 1967, was
the Tint generally publicized procedure for making
halftone pictures. Indeed, the 1967 publication sig¬
nalled the explosion of the University of Utah into
the forefront of computing research.
The Wylie-Romney method was actually the joint
work of Chris Wylie, Gordon Romney. David C. Evans
and Alan Erdali]; hut much of the impetus for its
development came from Evans, chairman of computer
sciences at Utah, who had long suspected the possibil¬
ity of 3-D halftone synthesis.
Halftone for art’s sake now the artist can create
worlds and photograph them. (Gordon Romney,
Utah)
Watkins method: A new nearest surface is
instantly sensed through continuous comparison
of the closest two
(Note: more output by
various Utah systems
appear on following pages.)
HOU AVAILABLE! Machine running Watkme
technique, the Watkine Box, alloue
uou to view imaginary objects in
color and manipulate them in real time.
See top of preceding page.
The scene was represented by a collection of edge
boxes, physically jumpered into a collection of facet
boxes. Each edge box and facet box was loaded with
certain numerical and logic values, representing edges
and facets in the scene, which could change between
frames as required by the action.
In the preprocess for each frame the old nasa sys¬
tem used a specially buill digital computer, the "vec¬
tor calculator." This performed at greal speed the
three-part vector calculations necessary lo determine
all scene positions, including the positions and slants
of all edges. Each individual edge generator, loaded
with its own edge position, constantly reported whether
the running scan of the picture was to the left or right
of its own edge. It dutifully guarded this edge from
border lo border of the picture.
"Ola NASA" method: tach edge t»« constantly
reports which side of its edge the scan is on.
each facet bo> sums the edge reports to sense
when the scan is crossing it
The Wylie-Romney method is this: for each picture-
point desired in the final picture, shoot a searching
ray through the scene at a corresponding angle. Find
where this searching ray hits eveiy surface in its way
Since the locations in space of these hit-points are
easily calculated, figure their distances from the vanlage
point. The nearest of the intersections is the visible
one. Look up the color of that surface and shade the
output point accordingly.
This may sound inefficient, but it is comparatively
easy lo ascertain all the piercing-points, since the sur¬
faces to be hit in a given scanning row can be largely
predicted from the previous row.
John Wurnock's method, also from Utah, is unre¬
lated lo the other methods, but has qualities mathe¬
maticians like, as well as a certain whimsy.
Consider a square in the picture area. (At the start
consider the whole picture area I Now then Test
whether the present square is entirely filled with one
color. If so, output a corresponding square all of lhat
color. If the present square is not all one color, divide
it into four smaller squares. Take another square and
go back to Now then. End the process when each of
the squares in the broken-down picture ho* been
completely filled with one color—or the unsatisfied
Shading: Last of the great fodge-functions
Suppose that we have some data structure represent¬
ing a three-dimensional object, and a halftone method
to search out it* visible surfaces. How do wc shade the
output pouits? What do wc take into account: how
combine the basic greys or colors, how blend them
with computations of surface angle, distances from the
vantage point, or anything else we can think of?
The answer: any way at all. The combining function
is an aesthetic choice. There are not many areas left
where you can make up a mathematical hodge-podge
and get pleasing or interesting results. Computer half¬
tone is a felicitous exception: you can augment by
adding or multiplying, diminish by subtracting or divid¬
ing, and yet always come up with an image resembling
something. Anyone who has worked in a darkroom
will recognize lhat this is like enlarging; playing with
parameter* won't obliterate the picture.
There are purists who insist that halftone coloration
should exactly follow the formula* lhat simulate the
behavior of real light. For some purposes, like pilot
training, this may often bc/truc. But insisting on mathe¬
matical accuracy a* a general principle is like insisting
on ultra-high fidelity—an aesthetic judgment couched
as a mechanical imperative.
Until now the output hardware was not really ready
for halftone Five years ago a computer could usually
create halftone pictures only on a line printer or a
4020 microfilm plotter. Today there are many different
photographic primers, going to all sizes of film and
paper; one even uses a laser. There arc various display
terminals permitting grey-scalc and color halftone on
TV screens.
The age of computer image synthesis has begun.
Polygon systems are fast and simple, and will come
to be used in our daily lives for such diverse purposes
as molecule study, the memorization of delivery routes,
and visualization of every kind of layout and design.
They will be fundamental to our new world of
com outer display. □
COMPUTER DECISIONS
%
JM37
SECOND ARTICLE.
Surface patterns.
Curvature.
Shadow.
THE PLOT SO FAR.
Various computer methods now make it
possible to create artificial photographs of
three-dimensional objects or scenes represented
in the computer's storage. This is done by
coloring or shading points in an output picture
like the points in the scene that can be sighted
through them from the vantage point. What
the methods really boil down to, though, are
searching processes in the data representation
of the three-dimensional scene.
In an earlier article we have considered
some of the techniques being used to depict
simple scenes-- those made up of polygons.
Now we turn to more elaborate scenes which add
shadows, surface patterns and curvature.
One of the most interesting things about
this branch of computer graphics-- already seen
in the polygon methods discussed earlier-- is
the variety of techniques that can be employed.
Moreover, these methods, for all their sophisti¬
cation, can usually be intuitively understood
as thought they were operations performed on
objects in space. The same continues to be true
for the more complex systems.
Of m L \Tf
VARIOUS NEW TECHNIQUES PERMIT US TO ADD CURVES,
SHADOWS AND SURFACE PATTERNS
TO COMPUTER-GENERATED HALFTONE PICTURES
ENHANCED POLYGON SYSTEMS
MAGNUSKI'S PATTERNED CONSTRUCTIONS
In the methods discussed so far, we looked
at several computer techniques for photograph¬
ically depicting scenes and objects made up of
polygons— planar facets— in a represented
three-dimensional scene. Imaginary houses of
cards, cardboard airplanes and triangular scen¬
ery take on a compelling vividness when depicted
by the computer. And for visualizing such
things as architectural arrangements, such
systems promise to be of increasing practical
value.
Those of us interested in the artistic
aspects of computer halftone images want more.
This article looks at some ways to add the
appearance of curvature and surface pattern
to computer-synthesized images.
MAGHUSKI'S CONSTRUCTIONS OF REPEATED PATTERNS
(different perspective calculations)
is stitched together
in adjacent positions
at appropriate angles.
A number of contributions have been made
by individuals working alone. For instance,
Henry Magnuski, at M.I.T., created a program
that repeatedly positions patterned facets in
space to make large constructions.
This program did not calculate "true"
shadow, basing its shading partly on angle of
surfaces. Neither does it show true curves.
Yet it shows the impressive degree to which
such effects may be approximated. The result¬
ing beach ball picture is reminiscent of Moorish
architecture.
Si
BOUKNIGHT AND KELLEY:
PICKING THROUGH A CAT'S CRADLE
The method of Bouknight and Kelley, at
the University of Illinois, permits the addition
of shadow to polygon pictures. Their method
uses an intricate system of scanning sweeps
across the scene, analyzing the successive edge-
crossings. For each output line, a list of the
edges in the scene is ordered according to which
will be next encountered. To make a specific
output line of shaded points, we step through
successive positions of the scan-line, until an
an edge is crossed. With each edge we cross,
we enter or leave at least one facet. Of all
the current facets we are in after a given edge¬
crossing, the system finds out the nearest one,
the visible one, by comparing distances. The
coloration of this facet is then fed out to the
picture, until the next edge-crossing.
Bouknight and Kelley expand their method
to show shadows by an additional step. They
create a new list of edges to be encountered,
this one relative to scans from the light source.
Then, during the regular output picture scan,
they look to this latter data to see about shadow.
As soon as they know two consecutive edges
of a visible object in the picture, they are able
to search the shadow-edge list to see if any
shadow-edges impinge between them. The final
list of edges-- visible facet edges and shadow
edges-- goes to the picture output device.
BOUKNIGHT-KELLEY METHOD
Consider the series of edges whose
projections cross the current scan-line.
Each time the scan-line crosses an edge,
find out what facets are currently pierced
by a sight-line from the viewpoint. The
nearest of these facets is the visible one.
To add shadow, use an extra list of
the scene’s edges relative to the light
rather than the camera. Between viewed
edges, check for shadow-edges as well.
r
DON LEE FILLS IN THE GAPS
Don Lee, at the University of Illinois,
produced his fine-toned pictures of spheres in
1966 simply because someone bet him a quarter
he couldn't program the method he'd suggested
in twenty-four hours. He almost made it. He
made his pictures of spheres and polygons by
calculating the boundaries, then checking for
overlap and filling in with greys according to
viewing angle. His program works only in
special cases, but is interesting for its historical
position; it was one of the earliest half-tone
curvature systems.
HAVE A BALL WITH DON LEE.
His program first works out
the general outlines.
DW
SIMPLEX CURVATURE SYSTEMS: MAHL & MAGI
A fundamental type of system we may call
the "simplex" system was exemplified in the
previous article by the Wylie-Romney program.
A simplex technique simply projects simulated
rays toward the scene from the vantage point
till they hit the represented objects, and fills
corresponding positions on the output picture
with the colors encountered on the front surfaces
of objects in the scene.
The same principle extends naturally to
scenes with curved and otherwise embellished
objects.
Robert Mahl, at the University of Utah,
has recently reported his results with simplex
methods using quadric surfaces— those curved
surfaces generated by mathematical powers of
two. His pictures— like the cup and saucer
shown here— have a pleasing 1920s Bauhaus-
like quality.
One problem with this method is that
computational complexity increases rapidly as
the scenes grow more complex; the more surfaces
and piercing-points, the more time-consuming
(and expensive) it becomes to make the picture.
w
G€KtR$uZiP MenV*, *is KfL ( F/et> igy sv^rt^
To ^ »- Hr* 1 ^
UiiHbK*. « J- L t tjL
t_ tUjrVt^ -1- A ile
r ' _—r\ 1 t ruH-/>i< a
V‘; •/•: ■•. \ <*sU ^rtidturv /
1
lUu«. l^uif U whs J*
tur^ sorfioL
^ Cp\ors j. ]W Svr^CA 4 a>. I
It seems, however, that Mahl's work may
only be a rediscovery of what one organization
worked out earlier and is being secretive about.
A firm delightfully called MAGI (Mathematical
Applications Group, Inc.) of Elmsford, N.Y.,
has extended the same idea more elaborately.
They happened into the halftone game through
a military contract.
MAGI’s system, now thoroughly developed
under Robert Goldstein, began in 1965 in a study
of radiation hazards in battlefield equipment.
They wrote a program to simulate paths of radia¬
tion, say, that might reach a tank driver under
varous disagreeable circumstances. Having
written a program that would ascertain the sus¬
ceptibility to radiation of battlefield machinery, .
they noted that the same program could be
adapted to making photographs. The progam
simulated radiation; light is radiation; ipso
facto, pictures. Substantially the same program
would make photograph-like images, by treating
the objects as opaque, and reflecting different
shades according to color and angle of view.
The resulting system makes nice pictures
of objects composed of planes and quadric sur¬
faces: and includes, as will be seen from the
racing car and chair, colored surface designs,
shadows and spectral reflections. Not only does
MAGl’s software for this process produce deli¬
cately shaded pictures; if the virtual picture-
plane is moved until it intersects the subject,
it produces a cross-section.
MAGI runs this program remotely in
Fortran on a big computer— but they have their
own minicomputer setup for photographing the
results as color movies. They now offer use of
this system commercially for making movies or
stills.
1 Color
N CHre^o^.-.
tv ^
t.
cole,
>«“l*r
e f I
you
MAGI program was originally developed
for study of radiation hazards inside
military armor; the pseudo-photographic
techniques were a side effe ct of the
approach chosen. Who know; , these
tanfcs may be the ones studied.
MAGI techniques were used to study
alternative ways of lighting nines.
SYNTHEVISION SETUP uses remote time-sharing computer,
running big secret Fortran program and containing
entire data structure of three-dimensional scenes.
Minicomputer photographic setup is on premises at
Computer Visuals, Inc., MAC1 subsidiary marketing
the Synthevlsion service.
Local setup uses Nova minicomputer controlling both
CRT display and camera. Informed guess would sug¬
gest that time-sharing system does not send all
successive points of output line, but difference
and transition values; Nova program would then in¬
terpolate gradations in relatively quiet sections
of the scan-line.
MAGI's precise system is secret. However, the only
real questions boll down to: forms of surface rep¬
resentation; systems of scene sorting; and method
of scene scanning to produce output scan.
Note that one of the most impressive things about
MAGI work, at least for sophisticates, is the de¬
gree of artistic control that seems to have been
realized in their input and revision systems. It
seems they offer excellent control over motion and
color, and, of course, revision of the action in
a scene till the maker is satisfied.
Popular 5c ience . I think it was
Synthevision in fall of 73.
Enlargement from MAGI film. I hope
the reproduction shows the concentric
rings, called Mach bands, that divide
areas of shading; Knowlton and Harmon
(citation p. DM 10) advise on pseudo¬
random techniques for correcting this.
These have been some of the highlights
of the halftone game to date. The methods des¬
cribed so far are mainly software-oriented, and
for the most part work most efficiently as pro¬
grams. In the next article we will look at some
outlandish new forms of equipment, under con¬
struction or proposed, for dedicated production
of 3-D halftone pictures.
, had
third article.
Specialized hardware systems.
SPECIAL EQUIPMENT IS NOW BEING BUILT
FOR MAKING "REALISTIC" HALFTONE
PICTURES BY COMPUTER. THIS ARTICLE
COVERS SOME OF THE MORE UNUSUAL
HALFTONE HARDWARE SYSTEMS NOW IN
EXISTENCE OR BEING PLANNED.
HAfoWHfG-
Of THt AcncTRies
Results of Gouraud's swell smoothing technique. Mme. Gouraud posed
for the dafa structure on the left, a system of interconnected .flat polygons.
The Gouraud process (see box below) created the smooth-looking face
from it by an extremely simple process. (Note that the power of the
technique is in the use of a simple polygon data structure, rather than
the more difficult truly-curved surfaces used, e.g., by MAGI.)
(Note also that the edges remain jagged.)
ttARJTmei A'COMifcT.
In two previous articles we have summar¬
ized some of the important basic techniques in
computer halftone-- the artificial construction by
computer of photographic pictures of 3-D scenes,
scenes which are represented within the computer
as colored or shaded surfaces placed in a coor¬
dinate system of three dimensions.
The techniques we have looked at were
all intuitively "spatial" in character, having to
do with the analysis of sight-lines and relative
edge positions, and suited to implementation in
computer software. Now we turn to some more
advanced and peculiar techniques and equipment
intended to make 3-D computer halftone faster
to use, or more realistic, or easier to work with
or cheaper. These systems represent a coming
generation df‘halftone hardware.
1 suggested this cover
for this article. The
folks at Computer Decisions
reacted with puzzlement
if not dismay. "This cover
doesn't have practical
applications for the
average user ." I think
someone said.
THE WATKINS BOX
The University of Utah is now building
what wil be for some time the world's most
spectacular interactive computer display, the
Watkins Box. This device, interfacing between
a computer and a television screen, will carry
out the Watkins algorithm (described in the
first article of this series) in real time : ripping
through a predigested list of facet information,
the Watkins Box will create on the screen an
image of an opaque object which the user can
rotate or see manipulated by program.
The Watkins Box can operate in two modes:
normal mode, in which the object appears faceted,
and Gouraud mode, in which it appears to be
curved over (see masks, nearby).
The Gouraud algorithm, developed by a
graduate student of that name, is a ridiculously
simple technique which marries perfectly to the
Watkins method. Instead of shading the facets
uniformly, this technique calculates a shade of
gray for each point. In effect the method inter¬
polates the shade of the point from those around
it, across facet boundaries. In actual proced¬
ure, the Gouraud method shades a point by
linear interpolation between two edge-colors:
the color of the last edge and the next edge to
be encountered on the present scan-line.
(These shades are in turn found by linear inter¬
polation between their endpoints.)
It will be noted that Gouraud's method
does not curve the edges. But considering its
simplicity as a small addition to the Watkins box,
that's no great sacrifice.
Naturally, the Watkins Box will not reach
the private home for several years: current
likely price is in six figures. But that's now.
GOURAUD'S TWIST adds the appearance of
curvature to a faceted object shown opaquely
by the Watkins method (described in first
article).
Instead of shading each point within a facet
with the same color, interpolate between the
vertex-colors according to how far down the
edges you've gotten. Note that the jagged
edges are retained.
GtwWrt SPECIAL wr
M 3§
PRA’S WORLD'VIEW
Roger Boyell, of Pennsylvania Research
Associates. Philadelphia, likes lo refer to the
company's main interest as "modelling the phys¬
ical world." Thus he and his associates have
developed systems for cartography, landscape
modelling, pipe design, and simulation of com¬
plex radar systems.
A radar simulator they are putting to¬
gether for the Navy will show the results of any
possible radar system moving over any possible
terrain. A pilot or navigator trainee, in a sim-
mulsted cockpit, will see the mission's changing
radar picture as he changes the plane's course
or the radar's tuning. The radar picture, ap¬
pearing on a screen and changing In real lime,
will look just the way Ihe radar would look on
a real mission-- flying In perspective among
mountains or valleys, high or low. at any bear¬
ing and speed, and viewed through any type of
radar.
Boyell's approach is to treat each cotnpo-
nent of the pictorial/radar simulation as a
separate problem, to be handled in different
ways, and blended in a final buffer, a core
memory which is read out to television. Sepa¬
rate mechanisms supply components of shadow,
specular reflection, coloration and randomizing
effects. The core buffer continuously refreshes
the scanned CRT display.
Boyell has pul the same techniques to
work making simulated halftone pictures of the
moon (see cut). Both the radar and moon sys¬
tems use the same type of halftone image synthe¬
sis. even though superficially they seem quite
different. But radar is radiation. Just like light,
and Boyell's techniques of three-dimensional
modelling and search apply equally well to de¬
piction by reflected visible light-- i.e., half¬
tone images.
.... ^81
faui'JWWW ..
core-net- - a TV inage constantly
heir" T'' like the Know 11on-Schwartz
setup: ... , . I DM24, top Schwartz
picture) . 'i ,u. Individual features <>m'-
at-a-clne to natch a changlnr, view.
An outfit called 1IUMRR0, In Vaahlnf t -> n , say
they have a real-tine Interactive
that will knock several people i>'.’
ballpark— especially the CC har
the Evans and Sutherland Watkins i;
Evidently they have In mind the use of
such high-performance scope* for'teach 1ng, al¬
lowing students to explore intricate threo-
dtaenslonal scenes or objects. Terrific.
(Note: compare the claim of 16,000 edges
on a $150,000 system with the 2000 (?) edges
allowed by the old NASA system built by CE,
or the Watkins Box-- I don't know how oany
cdpes-- at S500,000 from Evans and Sutherland.)
THE SHAPE OF THINGS TO COME
If these systems sound far fetched. or only
for theoreticsl investigation. consider this: the
Air Force is now letting contracts for sn ad
vanced flight training simulator that is s small
boy s dream. To be situated in Dry Lake.
Arizona. Ihe simulator will have the most real¬
istic cockpits ever built: the entire mockup will
turn and tilt In response to the user, and the
ml* will even swell and deflate . to simulate
acceleration and weightlessness. The cockpits
alone, without the visual display screens, will
cost ten million dollars each .
But the visual systems-- ah. The pilot-
user will look out inlo an artificial world, among
whose mountains and meadows and clouds he
will fly In resl time. Six CRTs, arranged as
parts of a dodecahedron In an entire visual
surround, will show him the chsnging ten-sin
and flying environment. Each of these CRTs
will be driven by a real time perspective
halftone simulator, with all displays spliced to¬
gether and driven by a master simulator res¬
ponding lo his actions. Who will build them is
not yet decided; they could be Waroock or GE
boxes.
The sheer joy of such a system will be
hard to beat. But no doubt others will be on
the way-- perhaps at the amusement park level.
at the scans . the pilot will sec a res¬
ponding perspective simulation of the
world he la flying through, planes he la
dog fighting with, and who knows— witches?
Superman?
tor of eif >
I don’t expect you to believe this. because
not even my patent attorney does, but the system
1 call Fantasm is intended to make pictures that
pass the Turing-test: you won't be able to tell
them from real photographs . Fantasm is inten¬
ded to allow the user to make realistic. Hierony
mus Bosch-like photographs and movies, with
real-looking people (and scenery, imaginary
characters, monsters, etc.) in scenes of arbi¬
trary complexity. It is expected that 1975 eco¬
nomics will make its construction feasible.
Fantssm I originally conceived as a method
of making realistic photographs and movies, not
knowing at the time that this was Impossible,
but feeling it could be done somehow if the
problem were broken down sufficiently. At
times it was not clear which of us would be
broken down first. 1 or it.
It occurred to me sometime in 1960-1 that
computer-interpolated, Disney-type cartooning
methods would be feasible. After some thought
1 realized that pseudo-photography would be
possible, and dropped the cartooning idea. The
atrange behavior of people whom I told about
this led me to increasing secrecy.
The general goal was to make a system
that could do realistic movies without scenery
or actors, end make pictures indistinguishable
from real photographs of reai Bccnery and
actors. ("What do you mean , indistinguishable
from photographs?" people keep asking. What
do they mean what do I mean?) The surfaces
are to be put in by "sculptors," animated by
"puppeteers," and photographed by a "director."
The objective is for moviemaking lo be under
ihe utter imaginative control of the creative user.
hT 0$r REV fA
at least to certain readers.
A scene of arbitrary curvature and topology Is represented
In S Syates of holding registers; the surface Is presented
(through D-to-A converters and an array parallel function gener¬
ator) to Interrogating circuitry which steers an Inquiring signal
around the represented aurfacea. Operation la empirical. Array
has partition Ingle allowing simultaneous queries of various sub¬
surfaces. Feedback steering circuitry allows multiple loops
through array. Steering signal and returned surface parameter
ere analog and continuous. Llat techniques manage shadow and
visibility 'umbrellas' (surfaces of occulted volumes or umbras).
The Fantasm Scene HachlnrfB*, the representation and search
array, Is one chip repeated in a carpet. Large-scale Integration
permits the required digital atorage of about 500 bits per sur¬
face section plus analog .circuitry and switching logic. Patent
The system could come In a number of dif¬
ferent versions. One of these involves a large
array of LSI computing modules (the checkerboard
Scene Machine) to be guided by special hardware
under on unusual monitor running on a general-
purpose computer. The checkerboard Scene
Machine holds a great spread of surface data.
It is a logical curiosity, an array that replies as
a unit, ignoring cell boundaries, to electrical
explorations of the shapes represented in it.
The resulting trace makes various 3-space ex¬
plorations on the faces, mountains or automobiles
spreadeagled in il. Think of its trace as a
radio-controlled firefly skating over a bumpy
checkerboard. Using this machine, and various
cat's-cradle list structures based on the geom¬
etry of light around odd volumes of occutlation.
the problem of halftone analysis of arbitrary
shapes is solved by brute force rather than
analytically. A variety of other processes have
also been defined in Ihe system for other types
□f graphic application.
As far os 1 have been able to learn, Fan¬
tasm is the moat baroque computer graphic system
anyone has proposed. It la not intended to oper¬
ate in real time, but rather take as long as it
needs, or as long as Ihe user wants to pay for.
to fill in complex visual details, shadow, reflec¬
tions. curlicues, leaves, hair, etc. It is best
suited to the production in Panavision of Busby
Berkeley musicals, or "The Lord of the Rings"
with realistic wraiths and interspecies battles.
Bui it may well cost too much to use for that.
Indeed, its economics seem to improve in low-
budget settings like videotape, although there
its output bandwidth will flower unseen. But
the Scene Machine should also be useful for
more mundane applications, such as contour
mapping, automobile design, advertising photo¬
graphy and medical Illustration.
«*■
W'*-
tkaRyw
II
SUMMARY: out 11 nee handled by Periaeter Paraaetcr Occul cation
Chasing, fill-in by Bullet Search, aninatlon continuity »»n»gi»ent
by 1 1st-procca a 1ng technlquea.
I an indebted to Frof , Char lee Strauee
for the formalization of my emoothing-
funotion.
fourth article.
Systems of Compuler Image Corporation.
OwrOTC*. W>k)»
80 FAR WE HAVE SUMMARfZED AND DISTINGUISHED AMONG
THE MAJOR TECHNIQUES FOR COMPUTER SYNTHESIS OF IMAGES
FROM DIOITALLY STORED REPRESENTATIONS OF SCENES.
WE NOW TAKE THE WRAPS FROM A DIFFERENT BUT RELATED
SET OF TECHNIQUES - THE SYSTEMS OF
COMPUTER IMAGE CORPORATION.
Lee Harrison III got the ides for Whst is
now Compuler Image Corporation in 1959. Al¬
ready having an art degree, he went on for a
degree In electrical engineering, and through
long lean years put together the technical basics
around which Ct'a ay atoms are now built. Com¬
puter Image Corporation la now a going concern,
and output from their ay sterna, especially Scan-
tmate, ia now widely vialble on television.
Computer Image Corporation seems io be
the first firm to be commercially successful in
the halftone field. Whether they should be
Included with the others ia arguable, however.
Their ayatema are not widely understood, and
the relation of theae systems to the other syalcms
and programs described in these articles is
problematical. Among the few who understand
their techniques. some argue thal they do not
synthesize images si all. but rather twist pre¬
existing pictures with a sort of Moog synthesizer,
and that their analog techniques are really just
compound oscillators rather than true computing.
I think that this view is wrong, at least as
regards their most ambitious system, and that
Cl's techniques deserve review. All the world
is not digital. Cl systems do fill up areas with
grey-scale (and other) pictures, and their sys¬
tems involve three-dimensional coordinates,
occullation and coloration; thus I think it ap¬
propriate to discuss them here.
The following discussion is the first. I
believe, to lift the veil of secrecy that has hith¬
erto confounded observers of this company’s
work. In the light of the extreme sophistication
with which they have pursued extremely strange
techniques, they should benefit from the wider
understanding. (Note that this material, which
has been assembled from various sources and
careful TV watching, la partly conjectural.)
Compuler Image's systems represent an
apparently unpromising approach brilliantly
followed through.
All of Cl’s systems are a strange combin¬
ation of closed-circuit TV and analog components
out of a music synthesizer; oscillators, poten¬
tiometers , interconnection networks. The basi c
mechanisms are the same for all. but they sre
carried to different logical extremes . with dif¬
fering accoutrements, in the four systems.
They all seem to be based on the extraordinary
Animac II. not yet implemented; it would seem
that for business reasons the company decided
to raise money promoting simpler systems, so
its bread and butter now consists of two less
ambitious systems, Scanimate and Animac I;
both of which might be puzzling if not recog¬
nized as parts of a more elegant whole. It
would seem they were designed backwards as
spinoffs from Animac II. as was CAESAR, their
more recent 2-D system.
The extraordinary ramifications and
varieties of this system, with all its electronic
add-on and composite methods, stagger the most
jaded technical imagination.
At the heart of the Cl systems is the prin¬
ciple of filling areas of a CRT screen with an
oscillating trace. This is a principle common
to both Lissajous figures and television; but
Computer Image has elaborated it peculiarly.
By variations they paint twisted television images,
wiggle sections of superimposed drawings, create
moving filigree effects, and hope to animate
whole groupa of opaque electronic puppets in
3-space.
Consider an oscillating trace on an oscillo¬
scope. This is a two-dimensional oscillation,
having two signals, x and y. But s three-dim¬
ensional oscillation is also possible; any third
signal, z, can be interpreted as a third dimen¬
sion. meaning that a "point of light" is whirling
out some pattern in a three-dimensional apace--
an oscillotank. so to speak. Let us call this
point moving in three dimensions a "space trace.”
Now to view this trace we need to cut it
down to two dimensions. By ignoring one of
the traces we can view the oscillotank in certain
fixed ways; but by creating a "view calculator,"
a box performing certain perspective transfor¬
mations on the three signals of the apace trace,
we may obtain a view of the oscillotank from a
movable vantage point. This is an x-y view
which we may put on an ordinary oscilloscope.
Let ua now add one more signal, b (for
brightness). This is the brightness signal fam-
^3
T3r
AE5AR System, Characters are
sde to nova Java and lips by
olntlng technique stellar to
nimac II (below) , but in euch
way as to matte over drawn
rtwork-- meantime wiggling
wHieubfo
UMWetft OF C£N^ur€< CCtfpOfVfT^.
1-- A > , ,
-O’
w«T l a ir-/£tfesi tf-
"> 3J>
OTYtVefm L fa
gives us a window into o peculiar sort of world:
a world In which luminous shapes can undulate and
spin on invisible spindles (Seaniaate), or wiggle
as separate bones (CAESAR.
Tubelike shapes nay be rotated and shaped in
3D (Aniaac), and puppets nay eventually be rolled
like cigarettes (Aniaac II), which a»y then be
painted from a TV pickup on the side nearest the
By using a storage tube and spinning the traci
close together, like cotton candy, and cutting off
the painting signal while the trace la within the
area already filled, we get electronic masking:
which blends animated drawings in 2D (CAESAR)
and may eventually manage shadows and occultation
masking laong 3D puppets (Aniaac II).
Lis a ajc_ufi and zigzag fig
are rapidly spun In three dimei
-- that is, varying voltages x
and z. The resulting "tubes” ,
"curtains" are then viewed by |
spectlve calculation. The ciri
permits these shapes to flex a
joints, wave, and go through o
changes.
IR SCANIMATE: zigzag and
curling shapes define
moving scroll on whlcl
IN CAESAR: curling 4hape:
treated 2-dimenalona
aa blocking controls
W-J OtJlfW* While showing $(.©<!<! >Sr
IfM j N\ew<^
— AND LATER, IN THE SAME FRAME:
cut off the
brightness of
the output signal,
wherever there la
already an Image
Brightness of the spot is thus independent
of the movement of the space trace. For example,
the apace trace could describe a helical path, a
sort of tornado motion, and we could time its
spinning to phase with a TV signal. If we now
brighten the apace trace only with the bright¬
ness signal of a TV pickup, we now will see
fin our view of the oscillotank) what would look
like a TV picture curled around itself in space.
Output from ell these signals is ordinsrily
picked up by another vtdicon. which stabilizes
it by converting it into conventional television
imagery,
A lest Ct technique, technically minor but
remarkable In effect, permits this blocking and
shadowing among separate objects. This is the
use of a storage CRT tube on which every frame
is painted (from the viewpoint or from the light
source). The picture is painted on the storage
CRT, nearest things first; and the return signal
from the screen tells whether the space trace ia
crossing an srea already painted during the
frame. The tube’s output signs! then effectively
constitutes a silhouette. This clue indicates that
the space trace should not be visible; and hence
is used to cut off brightness while the trace is
within the already-filled arcs. This gates
between two desired objects or pictures, fore¬
ground and background. If operated from the
point of view of the light, it gates shadow: the
signal is used to control the relative brightness
or the shadowed and unshadowed features of a
puppet in 3-space.
A fascinating variety of embellishments
has been put into these systems by Cl’s ingen¬
ious engineers. Coloration o( the final video
signal is added by gating color levels under
control of the brightness signal. permitting pic¬
tures with several grey-Ievela to be transformed
to up to four rainbow hues. Separate shapes
described by the space trace may be indepen¬
dently moved and jointed at the same time:
Harrison pointedly calls such separate shapes
’’bones." Darkening at the backside of s spun
shape, or brightening at edges of s painted por¬
tion. and brightening in proportion to curl, are
all strange capabilities of this machine. Lip-
synchronized mouthlike motion can be imparted
to any part of the shape spun by the space trace
(whether or not a mouth is painted on it), by an
audio detector feeding directly to the circuitry
from a live mike. And the limbs of Cl’s ghostly
figures can be made to swing by connection of
sensors to the animators themselves-- in a living
pantograph.
SCANIMATE is a popular device now widely
used (at Cl’s studios) for the making of TV com¬
mercials and station-break emblems. This ia
their simplest system, used for the conversion
and discombobulation of flat artwork. In Scant-
mate, the space trace is controlled by hand-
operated potentiometers. Two separate oscillator
settings are available, so that the space trace
can have two separate oscillation patterns,
spinning out two entirely different virtual shapes
in 3-spacc. A hand-throttle eases from one
oscillator setting to the other. This permits an
image to be moved, shrunk or enlarged, or
flipped; to go from whirling around to a sort of
hula; and many more effects. The picture
painted on it may be seen to roll on invisible
spindles, bloom into fountains, or undulate os
pennants-- all by modulating the brightness of
the flying spot as it traces its unseen shape.
This shape, in turn, can move between its two
forms under control of the throttle.
I Animac 1 (usually called Animac) provides
greater flexibility in controlling the space trace.
The system’s oscillations are controlled by an
input vidicon, which artists may quickly modify
with pastel check at the pickup. Ghostly tubu¬
lar lettering, swarming pendulum-patterns and
jiggling filigrees arc among the possible doodles.
CAESAR, their newest system, is oriented
toward Yogi Bear-type animation. The artist's
cartoons are automatically superimposed on a
background or each other. They may be moved,
and made to wiggle under real-time control by
But it is to Animac II that these curiosities
lead. What Harrison calls the "Snow White
Capability” of Animac II will permit the sculpture
of full humanoid puppets, with perhaps thirty
articulated "bones.” opaque to one another and
casting shadows, colored, moving and talking.
Two young fellas In a Manhattan loft,
Messrs. Rutt and Etrs, are offering a
machine similar to Scanimate but much
The only picture I've been able to
find that relates to the 3D sculpturing of
Animac II la this frame, blown up from a
short 16am sequence. The figure is sculp¬
tured from oac 1 list ions In three variables,
modulated to represent this figure of thir¬
teen sections or "bones.” Head and torso
are clearly visible in the film; the figure
Is seen to spin ss if in an ejection seat.
It's not aa finely detailed-- the inn'
screen runs at 525 lines rsther thsn
700— but It costs some $15,000 lnat«'
of $150,000.
DM 40
+pfe Wsot* <y*t+v*J.
WHAT ABOUT REAL THREE-DIMENSIONAL
DISPLAY?
In science-fiction stories you hear about
how objects are made to appear as if they’re
standing in the middle of the room. For instance,
I believe that in Heinlein’s Stranger in a Strange
Land they watched a "tank" in which things
appeared.
Well, a lot of people have thought about
this, and it's not so easy as you might think.
One interesting scheme used a sort of
translucent propellor, spinning rather fast, on
which computer- generated images were pro¬
jected from below. It was done by the dotting
method, so that a bright dot of light would ap¬
pear high or low in space depending on whe¬
ther it was projected on a relatively high or low
point on the propellor.
/
JL KH-*)
<yO|*fO- U<.t A BA-SVlSJ)
This was interesting but had numerous
disadvantages - not the least of which was the
danger of the thing flying apart. (Translucent
materials tend not to be as strong as, say,
metal.) Another basic problem, though, was
the fact that any given point in the space could
only be displayed at a given time , when the
propellor's height in that region was just right,
and that meant that at that given instant you
couldn't display any of the other points that
could only be displayed at that instant. A con¬
siderable disadvantage.
Probably the most astonishing 3D display
is Sutherland's Incredible Helmet. This consists
of a helmet with two dinky CRTs mounted on it,
each being driven in real time by a perspective
system (such as the LDS-1) and set up with
prisms to the wearer's eyes. Through the prisms
the wearer can see the real world in front of him.
Reflected in the prisms, however, and thus mixed
into the view of the real world, is the glowing
wire-frame being presented to him-- in perspec¬
tive, and with its separate views merging into
an apparent object in front of him . But he need
not stand still: as he moves, the helmet's chan¬
ging position is monitored by the program, and
the display system changes the views accordingly
meaning he can walk around and through a dis¬
played object. The illusion, and the possibilities,
are fantastic: imaginary architecture, explanations
and diagrams of things in the room, poetry that
changes as you walk through it, ... well, you
work on it. Not available commercially.
There was a lot to be said for tents. They
could be made by tailors, rather than construc¬
tion gangs; they could be transported and stored
flat. Their surfaee-to-volume ratios couldn't be
beat.
Noting this, an architect named Ron Resch
said to himself: what about making large-scale
foldable structures, likeunto geodesic domes,
that cou Id be simply manufactured in sheet
form and creased at the factory, then bolted and
cabled and strutted in the field?
Resch has now for years been experi¬
menting with complex folded structures.
There's only one trouble. If you've
messed with paper airplanes you know that
folding is an inaccurate process, and so the
prospect of discovering complex geometric struc¬
tures by the hand-folding of paper is rather
slim.
Recognizing this, Resch has contrived to
work at a computer display. His work-- the
search for great folding structures-- is one of
the first practical uses of halftone polygon
computer graphics. He is, naturally, at the
University of Utah.
Lou Katz, of NYU, put old-fashioned stereop-
ticons up to the CRT, and diapLayed two separate
views to the two eyes. Works fine, even with
isometric display.
Bob Spinrad of Xerox Data Systems has a
patent on displaying 3D from a computer through
an ordinary color TV. Assuming you're using
some standard way of refreshing the TV-- des¬
cribed elsewhere-- the image for one eye is dis¬
played in green , the other in red , and you look
through red and green glasses . The wonders of
modern science. Spinrad chuckles over It him¬
self.
Another scheme glued silver Mylar to the
front of a loudspeaker, then played a soft hum
through the loudspeaker to pulse the Mylar back
and forth. Then you used that as a mirror to
look at what was going on the CRT-- which was
showing a lot of points at odd places that would
appear to be in space. Unfortunately this was
hard to coordinate, and, like the propellor,
often required you to put dots in several placeB
at once, which don’t work.
For a while you could get— maybe you
still can-- a three-dimensional computer output
device. Here's what it did: it created objects
showing data structures that had three variables.
(It didn't make wire-frame objects or the like.)
Automatically ejecting wire through a styrofoam
block, and snipping the done ones, it created
little mountains showing three-dimensional data.
Very cute. Since many people have problems
with mountainous computer data, it probably
should have caught on.
Then a lot of people mumble the word
"holography," as if that is going to settle some¬
thing. While holograms are terrific and remark¬
able, and have been produced on computers,
making them is not a process that can be carried
out decently on sequential machines— let alone
making them in real time. So if a solution to
interactive three-dimensional computer display
is going to come through holography, it means
a whole new batch of technology will have to be
invented.
My friend Andrew J. Singer, who comes
and goes in the computer field and is one of
the five or six smartest people I ever met, says
he knows how to build a display tank, and I
believe him. He explained it quickly to me once
and I asked him to tell it again, but he just said
sadly, "What's the use-- there are so many
great things that could be done..."
FOUR DIMENSIONS, EGAD
So much for three dimensions. Now, some
readers are bound to ask, "What about four dim¬
ensions?" because they are science-fiction fans
or troublemakers or mathematicians or something.
Just as we can make a two-dimensional
picture of a three-dimensional object, it is pos¬
sible, dear reader, to make a two-dimensional
picture of a four- dimensional object.
What is a four-dimensional object?
Why, any object that has four dimensions,
(thanks a lot, you say), or even four measurable
qualities , such as height, weight, age and grade
point average. Well, let's not get into that, but
it turns out that views of such multidimensional
structures may be obtained by the same homogen¬
eous matrix technique^ already mentioned for
regular perspective calculations. Rule of thumb:
however many dimensions your data has originally,
you add one more dimension, homogeneous with
the rest, and there exist formulas (sorry, I don't
have them) for view calculation.
(Note, of course, that while a two-dimen¬
sional view is a picture , a three -dimensional
view is a three-dimensional object-- you'll have
to view it on an interactive 3D computer display
of some kind.)
68
DM 41
From videotape ,
"The Hydrogen Atom
According to
Quantum Mechanics"
by T.J. O'Donnell
& David Parrish.
11 is
especially
Usually it
finagling.
usualiy hard to combine things:
complicated technical things,
takes infinite reconsiderations,
modification, intertwingling.
The Circle Graphics Habitat, however,
is something else again. It results from
two intricate, independent technological
developments, each an intricate system care¬
fully crafted by an exceptionally talented
person, coming together like two hands clap-
ing. hike ham and eggs, like man and woman,
Sandin's Image Processor and DeFanti's GRASS
language conjoin directly and interact per¬
fectly as if they had been made for each
other, which they were not.
Dan Sandin's Image Processor (see p.d>M2)
is a system of circuit boxes that allow '
video images to be dynamically colored, mat¬
ted, dissolved and palpitated; Tom DeFanti's
language (see "Coup de GRASS, p.J)^^!) per¬
mits the rapid creation, viewing and manip¬
ulation of three-dimensional objects on the
screen of a particular computer setup.
To combine them, you just point Dan's
system at Tom's system.
Let's say that on the screen of Tom's
system we are viewing an animated bird,
flapping its wings. Since it's being shown
on a three-dimensional refreshed line display
(see pp-3^ 7 ‘3,b*\5o) , it appears only as white
lines on a dark screen.
Dan merely points a TV camera at Tom's
screen, and runs the TV signal into his Im¬
age Processor. Now, in the Image Processor,
he gives it the magic of color. Different
colors, interplaying with gradations and
subtlety.
From the Image Processor, the finished
signal goes out to videotape recorders.
What then have we overall? One of the
world's most flexible facilities for the
rapid production of educational videotapes.
To explain something, you create a
three-dimensional stick-figure "model" of it,
using DeFanti's GRASS language. Then you
make a videotape of it, showing rotations or
other manipulations, using the Image Proces¬
sor to give it color.
DeFanti and Sandin have spent much of
the academic year '73-4 getting the kinks out
of this procedure. (Many of the difficulties
stem from the unreliability of videotape re¬
corders.) Stills from some of the first work
are shown here.
BIBLIOGRAPHY
Thomas A. DeFanti, Daniel J. Sandin and
Theodor H. Nelson, "Computer Graphics as
a Way of Life." To be presented at U.
of Colorado computer graphics conference,
July 1974; to appear in proceedings pur¬
portedly to be called Computers and Graphics .
■fte T'tfUC Of VjOU&Hf
Uneducated people typically think of
education as the learning of a lot of facts
and skills. While facts and skills certainly
have their merits, "higher education" is also
largely concerned with tying ideas together,
and especially alternative structures of such
tying-together: with showing you the vast un¬
certainties of things.
A wonderful Japanese film of the fifties
was called Rasho - Mon . It depicted a specific
event-- a rape-- as told by five different
people. As the audience watches the five se¬
parate stories, they must try to judge what
really happened.
The Rasho-Mon Principle: everything is
like that. The complete truth about something
is never known.
Nobody tells the complete truth, though
some try. Nobody knows the complete truth.
Nowhere may we find printed the complete truth.
There are only different views, assertions,
supposed facts that support one view or another
but are disputed by disbelievers in the particu¬
lar views; and so on. There are "agreed-on
facts," but their meaning is often in doubt.
The great compromise of the western world
is that we go by the rule: assume that we never
know the final truth about anything. There are
continuing Issues, Mysteries, Continuing Dia¬
logues. What about flying saucers, "why Rome
fell," was there a Passover Plot, and Did Roose¬
velt know Pearl Harbor would be attacked?
Outsiders find the intellectual world pom¬
pous, vague in its undecided issues, stuffy in
its quotes and citations. But in a way these
are the sounds of battle. The clash of theories
is what many find exhilarating about the intel¬
lectual world. The Scholarly Arena is simply
a Circus Maximus in which these battles are sche¬
duled.
Many people think "science" is free from
all this. These are people who do not know much
about science. More and more is scientifically
known, true; but it is repeatedly discovered that
some scientific "knowledge" is untrue, and this
problem is built into the system. The important
thing about science is not that everything will
be known, or that everything unanimously believ¬
ed by scientists is necessarily true, but that
science contains a system for seeking untruth
and purging it.
This is the great tradition of western
civilization. The Western World is, in an
important sense, a continuing dialogue among
people who have thought different things.
"Scholarship" is the tradition of trying to
improve, collate and resolve uncertainties.
The fundamental ground rules are that no issue
is ever closed, no interconnection is impossible.
It all comes down to what is written , because
the thoughts and minds themselves, of course, do
not last. (The apparatus of citation and foot¬
note are simply a combination of hat-tipping,
go-look-if-you-don't-believe-me, and you-might-
want-to-read-this-yourself.)
"Knowledge," then-- and indeed most of our
civilization and what remains of those previous--
is a vasty cross-tangle of ideas and evidential
materials, not a pyramid of truth. So that pre¬
serving its structure, and improving its accessi¬
bility, is important to us all.
Which is one reason we need hypertexts and
♦hinkertoys.
Wt$£€HT»jT>eML
Ate AtR'TRAK-V
4 (of <f feyLeit. t° -4
64 I 1 '* <W> 11 4'^ ijutsfoA?.
>—-___4>
1 1 ^ fl "t icloo^ fU OHt tiujlf will U
^ wwg-
As far as I can tell, these are the techniques used
by bright people who want to learn something other than
by taking courses in it. It's the way Ph.D.'s pick up
a second field; it's the way journalists and "geniuses”
operate; it brings the general understandings of a field
that children of eminent people in that field get as a
birthright; it's the way anybody can learn anything, if
he has the nerve.
1. DECIDE WHAT YOU WANT TO LEARN. But you can't
know exactly , because of course you don't know exactly
how any field is structured until you know all about it.
(M iT.
2. READ EVERYTHING YOU CAN* especially what you
enjoy, since that way you can read more of it and faster.
3. GRAB FOR INSIGHTS- Regardless of points others
are trying to make, when you recognize an insight that has
meaning for you, make it your own. It may have to do with
the shape of molecules, or the personality of a specific
emperor, or the quirks of a Great Man in the Field. Its
importance is not how central it is, but how clear and in¬
teresting and memorable to you. REMEMBER IT. Then go for
another.
4. TIE INSIGHTS TOGETHER. Soon you will have your
own string of insights in a field, like the string of light*
around a Christmas tree.
5. CONCENTRATE ON MAGAZINES, NOT BOOKS. Magazines
have far more insights per inch of text, and can be read
nuch faster. But when a book really speaks to you, lavish
attention onjt.
6. FIND YOUR OWN SPECIAL TOPICS, AND PURSUE THEM.
7. GO TO CONVENTIONS - For same reason, conventions are
a splendid concentrated way to learn things; talking to people
helps. Don't think you have to be anybody special to go to a
convention: just plunk down your money. But you have to have
a handle. Calling yourself a Consultant is good; "Student" is
perfectly honorable.
8. "FIND YOUR MAN.” Somewhere in the world is someone
who will answer your questions extraordinarily well. If you
find him, dog him. He may be a janitor or a teenage kid; no
matter. Follow him with your begging-bowl, if that’s what he
wants, or take him to expensive restaurants, or whatever.
9. KEEP IMPROVING YOUR QUESTIONS. Probably in your
head there are questions that don't seem to line up with
what you're hearing. Don't assume that-you don’t understand;
keep adjusting the questions till you can get an answer that
relates to what you wanted.
10. YOUR FIELD IS BOUNDED WHERE YOU WANT IT TO BE.
Just because others group and stereotype things in convention¬
al ways does not mean they are necessarily right. Intellectual
subjects are connected every whichway; your field is what you
think it is. (Again, this is one of the.things that will give
you insights and keep you motivated; but it will get you into
trouble if you try to go for degrees.)
There are limitations. This doesn't give you lab ex¬
perience, and you will continually have to be making up for
gaps. But for alertness and the ability to use his mind,
give me the man who's learned this way, rather than been
blinkered and cliched to death within the educational system.
BIBLIOGRAPHY
Wilmar Shiras, Children of the Atom .
Science-Fiction about what a school could be like where
kids really used their minds. I've always been sure it
was possible; the R.E.S.I.S.T.O.R.S. (see p. 47* made
me surer.
^ hd ‘ 06 *3l
TVUCAIXV SPURiooy
£©MMT*ik|TM.IK!> Mh mtATIPieJ
rre*riF)Cj
"ON WW6-/'
8 ")kt cr«jwt yocetf
being an examination of some very Complex Matters
which Nobody Seems to Understand; and whose
Generality of Relevance may be Gradually Apprehended.
[Eventually I hope to develop a somewhat more formal
treatment of "ideas," as distinct from propositions,
sentence kernels, etc. But there is certainly no room
for that here. (Logicians; show me the truth-table of
"BUT.")
Now, it happens that a great deal of writing is concerned with
notes to the reader about accordances in the material. In fact,
quite a few words are exclusively concerned with subtly pointing out
to the reader the accords and discords within the expository structure
of what he is reading. We may call these accordance-connectives or
accordance-notes .
Two of the most basic terms are Indeed and but .
The word indeed has an interesting function.
The process of writing is poorly understood in most quarters.
Many working writers despair of being "systematic," getting
things done as best they can. On the other hand, people who think
they might be able to contribute-- particularly the symbolic logi¬
cians and transformational linguists— being imnersed in their own
formalisms, simply don’t see what’s going on— at least, when I’ve
tried to talk to them.
Writing is not simple. As with vision or speech or riding a
bicycle, an immensely complex process is being unconsciously pur¬
sued.
Some people think you make an outline and follow it, filling
out the details of the outline until the piece is finished. This
is absurd. (True, some people can do this, but that is simply a
shortcutting of the real process.) Basically writing is 4
THE TRY-AND-TRY-AGAIN INTERPLAY of PARTS AND DETAILS against
OVERALL AND UNIFYING IDEAS WHICH KEEP CHANGING.
In fact a number of things are happening, often simultaneously.
We can separate them into three:
1. Provisional development of ideas and poinU:
A) forming overall organizing ideas, B) selecting ten¬
tative points; C) inductively finding overall organiza¬
tion among them; D) finding relations of interest between
points.
2. Complex sifting and adjustment among collections of points,
overall ideas.
3. Fine splicing within developed sequences.
A) transition and juxtaposition managements, B) cross¬
citations, C) smoothing.
Regrettably, there’s no room or time to pursue this here.
{The article I had intended to write would take a whole spread.)
For people who really care about the matter, I will make some
points in very abbreviated form.
The interesting structures in written material include:
"Points"— pieces, sentences, phrases, examples, plot events,
and expository "points."
Organizing principles and structures (which we will call here
arches )— final ironies, things to be led up to, themes,
plots, concepts, principles, expository structures,-or¬
ganizing titles, overconcepts. These may be either local
or global, over the entire work. (Note: arches may not
be heirarchical relative to one another.)
Now, we may think of points and arches as individual objects
which have individual relations to one another. Between two points
ther^ may be a good transition ; a specific point may link well to a
specific arch.
The problem in writing, then, is that overall structures you
choose {systems of arches) may not link well to the points that
have to be included among them; and that transitions between points
don’t work out the way you want them to. Good transitions can’t be
worked out for the sequence of points you want to make, or, alter¬
natively, there are too many good transitions within a specific
structure of points, and picking among them involves difficult
choices especially when you have to devise appropriate arches on
the basis of the final sequence of points.
There are a number of other important structures in written
material. They include accordances, juxtapositions, cross-citations,
connotations, nuances and rhythms.
The only ones we will discuss here are accordances .
The term "accordance," as I shall use it here, is simply a
vaguely formal way of talking about whether things match or fit
together . Two items are in accord if they match or fit well, or in
discord if they match or fit badly. Thus a good transition between
points (as mentioned early) represents an accord, and a good link
between a point and an arch is also an accord.
The word Indeed (in its main use, at the beginning of a sentence)
indicates an accord between what has just been said and what is to
follow. In other words, it functions as a positive transition, impe¬
tus or gas pedal, indicating a continuation of the flow in the direction
already indicated. So do the words thus , then , therefore , moreover , so
and furthermore . These are infix accords , that is, notes of accord
that go between two items. We also see prefix accords , such as
since , inasmuch as , insofar as ; these have to be followed by
two clauses, the second of which is in accord with the first.
The word but is exactly the opposite. It indicates a discord or
contradistinction, a negative transition, "brakes" in the flow. Other
such infix discords include nevertheless , despite this , on the other
hand , even so , and "Actually ,..." Similarly, there are prefix dis¬
cords : while , despite , though ..., notvithstandinq .
I find this topic of inquiry very interesting. These sorts of
terms have been used since time immemorial by writers adjusting their
transitions for smooth flow (note such antiquey variants as haply ,
howbeit , withal , forasmuch and howsomever) , but the importance and
structure of this service has not, I think, been generally understood.
(Note also that there are more intricate accordance-connectives;
I wish we could go here into the structure of In at least ,
..,i£ not ... , _ otherwise — , Anyway ... , and Now ....)
(Note: the try-and-try-again revision and reconsideration process,
tinkering with structural interconnections, is a universal component
of the creative process in everything from movie editing to machine
design. There ought to be a name for it. I can’t think of a satisfac¬
tory one, although I would commend to your attention qrandesigning ,
piece-whole diddlework , grand fuddling , meta-mogrification , and
that most exalted possibility, tagnebulopsis (the visualization of
structure in clouds).)
THE H«'T*6E
The past is like the receding view out the back
of an automobile: the most recent is more conspicuous,
and everything seems eventually to be lost.
We know we chould save things, but what? Those
with the job of saving things— the libraries and mu¬
seums— save so many of the wrong things, the fashionable
and expensive and high-toned things esteemed by a given
time, and most of the rest slips past. Each generation
seems to ridicule the things held in esteem by times be¬
fore, but of course this can never be a guide to what
Bhould be saved. And there is so much to save: music,
writing, sinking Venice, vanishing species.
But why should things be saved? Everything is
deeply intertwingled. We save for knowledge and nos¬
talgia, but what we thought was knowledge often turns
to nostalgia, and nostalgia often brings us deeper in¬
sights that cut across our lives and very selves.*
Computers offer an interesting daydream: that we
may be able to store things digitally Instead of
physically . In other words, turn the libraries to digi¬
tal storage (see Hypertexts, ^.*911 + ); digitize paintings
and photographs (see "Picture Processing* p.!*j0);even
digitize the genetic codes of animals, so that species
can be restored at future dates (see "The Mlciesc Com¬
puter," p. &o).
Digital storage possesses several special advantages.
Digitally stored materials may be copied by automatic
means; corrective measures are possible, to prevent errors
from creeping in— i.e., "no deterioration" In principle;
and they could be kept in various places, lessening man¬
kind’s dependence on its eggs being all in one basket (like
the Library at Alexandria, whose burning during the occupa¬
tion of Julius Caesar was one of the greatest losses in
human history).
But this would of course require far more compact
and reliable forms of digital storage than exist right now.
Nevertheless, we better start thinking about it.
Those who fear a coming holocaust (see p. f'l ) had best think
about pulling some part of mankind through, with some part of
what he used to have.
* See T.H. Nelson, The Snunklng of the Heart : On the
Psychology of Puns and Preterism in CarroH and Others.
1980, unless a decent writing system comes along.
78
DM 44
HreJC»jTM10*/*L i9fTC*\f-
fwra^fc
In recent years a very basic change has occurred in
nro.JtaUonal systems of all kinJs. We may summarize it
sj^f;rL c .“. b t r Js £“
(and other) multidimensional ways.J
A number of branching media exist or are possible.
Branching movies or hyperfilms (see nearby).
Branching texts or hypertexts (see nearby).
Branching audio, music, etc.
Branching slide-shows.
Wish we could get into some of that stuff here.
^ov/ies
The idea of branching movies is quite exciting.
The possibility of it is another thing entirely.
The only system I know of that worked was at the
1967 Montreal World’s Fair (Expo 67). At the Czech
Pavilion— you will recall that before the crackdown
they had quite a yeasty culture going in Czechoslovakia—
there were some terrific fantic systems going. One was
a wall of cubes with slide projectors inside (that roll¬
ed toward you and back as they changed their pictures).
And then the Movie.
The Czechoslovakian Branching Movie— I forget its
real name— had the audience vote on what was to happen
next at a number of different junctures. What should
she do now, what will he do next, etc. And lo and behold!
after they had voted, the lights went down, and that's
what would happen next. People agreed that this gave
the movie a special immediacy.
REALITY IS OBSOLETE
The Idea that objective reality Is perceived by our senses.
Is an obsolete concept. Old truisms like "seeing is believing",
become much less believable as we become more aware that, the
biological machinery of life Itself, transforms images of the
physical world before we are made conscious of them. These
biological mechanisms share many similarities in principle and
in application, to other mechanisms observed in the natural
environment and those invented for our own use. Since we are
becoming more aware of the nature of perception and those
mechanisms involved, now is the time to gain control of our¬
selves and share more discretion in the operation-of our own
biological machinery. We have entered the age of hyper-reality.
Day-to-day living provides only a limited variety of
physical stimulus, and little incentive to manipulate the
physiological and psychological processing involved. Man's
historical preoccupation with the need to maintain constant
images of the physical world, is a product of his extreme
orientation toward physical survival in a hostile environment.
The current evolving society of leisure orientations removes
this need for constant images and thereby enhances the opportunities
for a more complete use of the sensory apparatus and those re¬
lated brain functions. Many have turned to drugs or meditation.
More specifically it is proposed here, that modern communications
technology be employed as a "vehicle of departure" from this need
for constant images, to bring about a more complete use of the
human technology itself. Hyper-reality is the employment of
technology other than the biological machinery, when used to
affect the performance of the biological machinery beyond its
own limitations. This is almost like making adjustments on a
television set, except you are what's plugged in, and the con¬
trols are outside your body, being part of whatever technology
is interfaced to the body itself. As part of such a man-
machine interface you could extend your own mental processes,
or if you should choose, you could just diddle with the dials.
Hyper-reality is an opportunity to enhance the various qualities
of the human experience. Reality is obsolete.
A — How Waoh8preeB (see p. DM 6)
COPYRIGHT 1973 AUDITAC, LTD.
! 6RE5HETUS-
I never saw the movie— I waited in line several
hours but the line was too long to get into the last show¬
ing. So instead I went backstage and talked to Radusz Cin-
cera, who worked out the system. It turns out that it
didn't work quite the way people supposed. A lot of people
thought that "all the possibilities" had been filmed in ad¬
vance. Actually, there were always only two possibilities,
and no matter what the audience had chosen, somehow the film
was plotted to come down to the same next choice anyway:
Now, in our time, we are turning Gutenberg
around. The technology of movable type created
certain structures and practices around the writ¬
ten word. Now the technology of computer screen
displays make possible almost any structures and
practices you can imagine for the written word.
So now what?
For new forms of written communication am¬
ong people who know each other, jump to "Engel-
bart" piece, nearby.
To learn about new forms of multidimensional
documents for computer screens, jump to "Hyper¬
texts.”
In the actual setup, they simply had two projectors
running side by side, with Film A and Film B, and the
projectionist would drop an opaque slide in front of
whichever wasn't chosen. But Cincera said that aud¬
iences almost always chose the same alternatives anyway,
so half the movie was hardly ever used...
In the early sixties a movie was making the rounds
in which audiences were supposedly allowed to vote on the
ending— "Mr. Sardonicus," I believe it was called. From
the ads it seemed that audiences would be polled as to
which last reel to show. Whether the villain was to get
his comeuppance, or whatever.
Then there was that Panacolor cartridge projector,
mentioned elsewhere, which would have allowed choices by
the user
More recently there's the CMX system, also mentioned
elsewhere. This is a setup, being jointly marketed by
CBS and Memorex, for computer-controlled movie editing.
But actually it could also be used as a branching movie sy¬
stem. Essentially the movie itself is stored frame-by-
frame (as video) on big disks, made by Memorex; and, under
computer control, the output can be switched rapidly among
the frames, effectively showing the stored movies. (To my
knowledge, the video networks haven't yet recognized the
possibilities of this.)
The only trouble is, it's extremely expensive (half a
million?), it has an exact storage capacity limited by the
number of disk tracks (presumably one track per frame) —
perhaps five minutes total one one big unit, but you can
buy more— and it can only give its full performance to
one viewer at a time.) (Or T» fe. mIum* f.*.)
It may be that the most practical branching movie
system would be a cartridge movie viewer and a big stack of
cartridges. When you make your choice, change the cart¬
ridge. But of course that's not i
happen automatically.
i much fun as having it
S8
Or just feel free to browse.
HWTOT
By "hypertext" I mean non-sequential
writing.
Ordinary writing is sequential for two
reasons. First, it grew out of speech and
speech-making, which have to be sequential;
and second, because books are not convenient
to read except in a sequence.
But the structures of ideas are not se¬
quential. They tie together every whichway.
And when we write, we are always trying to
tie things together in non-sequential ways
(see The footnote is a break from
sequence; but it cannot really be extended
(though some, like Will Cuppy, have toyed
with the technique).
I have run into perhaps a dozen people
who understood this instantly when I talked
to them about it. Most people, however, act
more bemused, thinking I*m trying to tell them
something technical or pointlessly philosoph¬
ical. It's not pointless at all: the point is,
writers do better if they don't have to write
in sequence (but may create multiple struc¬
tures, branches and alternatives), and readers
do better if they don't have to read in seq¬
uence, but may establish impressions, jump
around, and try different pathways until they
find the ones they want to study most closely.
(The astute reader, and anybody who's gotten
to this point must be, will have noticed that
this book is in ’'magazine" layout, organized
visually by ideas and meanings, for that pre¬
cise reason. I will be interested to hear
whether that has worked.)
And the pity of it is that (like the man
in the French play who was surprised to learn
that he had been "speaking prose all his life
and never known it"), we've been speaking
hypertext all our lives and never known it.
Now, many writers have tried to break
away from sequence. I think" o£~Nabokov's
Pale Fire , of Tristram Shandy and an odd novel
of Lazaro Cortazar called Hopscotch , made up
of sections ending with numbers telling you
where you can branch to. There are many more;
and large books generally use many tricks to
get around the problem of indexing and review¬
ing what has and hasn’t been said or done al¬
ready.
However, in my view, a new day is dawning.
Computer storage and screen display mean that
we no longer have to have things in sequence;
totally arbitrary structures are possible, anti
1 think that after we've tried them enough
people will see how desirable they are.
DM 45
TYPES OF HYPERTEXT
Let's assume that you have a high-power
display- and storage displays won^t ^ be¬
cause you have to see things move in order
to understand where they come from and what
Jhey ">«»"• (Especially text.) So it has to
be a refreshed CRT.
Basic or chunk style hypertext offers
choices^ eTther as Toot™te-markers (like
isterisksl or labels at the end of a chunk.
Whatever you point at then comes to the screen.
Collateral
hypertext means compound an-
iral lei text (see p.
notations or para
Stretchtext changes continuously . This^ ^
requires very unusual techniques isee
but exemplifies how "continuous” hypertext might
work.
Ideally, chunk and continuous and collateral
hypertext could all Be combined (and in turn col¬
laterally linked; see "Thinkertoys," p.J^Z-).
A "fresh" °r "specific" hypertext-- I don't
have a better term at the moment-- would consist
of material especially written for some purpose.
An an thological hypertext, however, would consist
of materials brought together from all over, like
an anthological book.
A grand hypertext , then, folks, would be
a hypertext consisting of "everything" written
about a subject, or vaguely relevant to it,
tied together by editors (and NOT by "prog¬
rammers," dammit), in which you may read in
all the directions you wish to pursue . There
can be alternative pathways Tor people who
think different ways. People who have to
have one thing explained to them at a time--
many have insisted to me that this is normal,
although I contend that it is a pathological
condition-- may have that; others, learning
like true human beings, may gather and sift im¬
pressions until the ideas become clear.
And then, of course, you see the real
dream.
CAN IT BE DONE?
I dunno.
Licklider, one of computerdom's Great Men,
estimated in 1965 that to handle all text by
computer, and bring it out to screens, would
cost no more than what we pay for all text
handling now . (But of course there is the
problem of what to do with the people whose
lives are built around paper; that can't be
taken up here.)
The people who make big computers say
that to get the big disk storage to hold great
amounts of text, you have to get their biggest
computers. Which is a laugh and a half. One
IBM-style computer person pompously told me
that for large-scale text handling the only
appropriate machine was an IBM 360/67 (a shame
fully large computer). Such people seem not
to understand about minicomputers or the po¬
tential of minicomputer networks-- using, of
course, big disks.
There are of course questions of relia¬
bility, of "big brother" (see Canons, p. )
and so on. But I think these matters can be
handled.
CVWMUlt-
IS It&Li INTOCThJlII&CD.
In an important sense there are
no "subjects" at all ; there is only
all knowledge t since the cross-
connections among the myriad topics
of this world simply cannot be
divided up neatly.
The key is that people will pay for it.
I am sure that if we can bring the cost down
to two dollars an hour-- one for the local
machine (more than a "terminal"), one for the
material (including storage, transmission and
copyrights)-- there's a big, big market. (And
that's what the Xanadu network is about; see
p. f)7.) My assumption is that the way to do
this is not through big business (since all
these corporations can see is other corpora¬
tions); not through government (hypertext is
not committee-oriented, but individualis tic--
and grants can only be gotten through sesqui¬
pedalian and obfuscatory pompizzazz); but
through the byways of the private enterprise
system. I think the same spirit that gave us
McDonald's and kandy kolor hot rod accessories
may pull us through here. (See Xanadu Network,
P-
Hypertext at last offers the possibility
of representing and exploring it all
without carving it up destructively .
Arthur C. Clarke wrote a book entitled
The Lost Worlds of 2001 (Signet, 1972),
about the variants and alternatives of’
that story that did not find their way
to the screen.
In a hypertext version, we could look
at them all in context, in collateral
views, and see the related variants--
with annotations.
The real dream is for "everything" to He
in the hypertext.
Obviously, putting man's entire heritage
into a hypertext is going to take awhile. But
it can and should be done.
U
7
o
.Everything you read, you read from the
screen (and can always get back to right away);
everything you write, you write at the screen
(and can cross-link to whatever you read; see
Canons , p. bh 71 ).
BIBLIOGRAPHY
Theodor H. Nelson, "The Hypertext." Proc.
World Documentation Federation, 1965.
Mortimer J. Adler, the ..«n who reduced all of
Western Culture to a few Great Books plus an index
under his own categories, has now Addled the
Encyclopedia Britannica .
Paper moulders. Microfilm is inconvenient.
In the best libraries it takes at least min- '
utes to get a particular thing. But as to
linking them together-- footnoting Aeschylus
with Marcus Aurelius, linking genetic data
to 15th-century accounts of Indian tribes--
well, you can only do it on paper by writing
something new that ties them together. Isn't
that ridiculous? When you could do it all
electronically in seconds?
Now that we have all these wonderful de¬
vices, it should be the goal of society to put
them in the service of truth and learning.
And this is the way I propose. Not through
obscure forms of "information retrieval;" not
through newly oppressive forms of "computer^ -
assisted instruction;" and not through a pur¬
ported science of "artifical intel1igence"
that will create new personalisms to irk us.
All these obstructive oddities, I think, have
developed as separate ideals because of the
grand preposterosity of Professionalism that
has created a world-wide cult of mutual incom¬
prehensibility and disconnected special goals.
Now we need to get everybody together again.
We want to go back to the roots of our civil¬
ization-- the ability, which we once had, for
everybody who could read to be able to read
everything. We must once again become a com¬
munity of common access to a shared heritage.
This was of course what Vannevar Bush
said in 1945 (see ^"Vrjlr) , in an article every¬
body cites but nobody reads.
The hypertext solution in many ways ob¬
viates some of these other approaches, and in
addition retains and puts back together the
great traditions of literature and scholarship,
traditions based on the fact that dividing
things up arbitrarily just generally doesn't
work.
EVERYTHING IS DEEPLY INTERTWINGLED.
(The only way in which my views differ
with those of Engelbart and Pask, I think is
in the matter of structure and hierarchy.
Both men generally assume that whatever
natural hierarchy may exist in particular
subjects needs to be accentuated; I hold that
all structures must be treated as totally ar¬
bitrary, and any hierarchies we find are inter¬
esting accidents.)
- H -
COULDN’T HAVE HYPERTEXT NOVELS, YOU SAY?
Consider the hypertext character of—
Tristram Shandy , by Sterne.
Spoon River Anthology , by Masters.
Hopscotch , by Cortazar.
Pale Fire , by Nabokov.
Remembrance of Things Past , hy Proust.
And, surprisingly, hypertext actually
FIGURES IN Giles Goat-Boy , by Barth.
7
GLINDA'S MAGIC BOOK
Gllnda the Good, gentle sorceress of the
southern quadrant of the land of Oz— not the
flaphead portrayed by Billie Burke in the
Goldwynized film— has a Magic Book in which
Everything That Happens Is written.
The question, of course, Is how it's
chosen.
You can only watch news tickers for a
short time before getting very bored.
Since 1965 he has been creating Britannica 3,
the venturesome and innovative new version, now on
sale for about half a thou.
Britannica 3 is basically a 3“level hypertext,
made to fit on printed pages by the strictures of
Adler's editing (according to Newsweek . some 200
authors withdrew their work rather than submit to
the kind of restrictions he was imposing).
The idea may be basically good, even though
the sesqutpaedalIan titles may Impaed the raeder.
THE BURNING BUSH
In fact hypertexts were foreseen very
clearly in 1945 by Vannevar Bush, Roosevelt's
science advisor. When the war was in the bag,
he published a little article on various groovy
things that had become possible by that time.
"As We May Think" ( Atlantic Monthly , July,
1945) is most notable for its clear description
of various hypertext techniques-- that is, link¬
ages between documents which may be brought rap¬
idly to the screen according to their linkages.
(So what if he thought they'd be on microfilm.)
How characteristic of Professionalism.
Bush's article has been taken as the starting
point for the field of Information Retrieval
(see p. ), but its actual contents have been
ignored by acclamation. Information Retrieval
folk have mostly done very different things, yet
thought they were in the tradition.
Now people are "rediscovering" the article.
If there's another edition of this book I hope
I can run it in entirety.
rV
DM 46
Mr €H<r€U WT ANj>
Thc Ao&neMwoKi
t>F l^eU-eCT"
Douglas Engelbart Is a saintly man at
Stanford Research Institute whose dream has
been to make people smarter and bring them
together. His system, on which millions of
dollars have been spent, is a wonder and a
glory.
He began as an engineer of CRTs (see
"Lightning in a Bottle," p.ifl6); but his
driving thought was, quite correctly, that
these remarkable objects could be used to
expand man's mind and improve each shining
hour.
Doug Engelbart's vision has never been
restricted to narrow technical issues. From
the beginning his concern was not merely to
plank people down at display consoles, but
in the most profound sense to expand man's
mind. "The Augmentation of Human Intellect,"
he calls it, by which he means making minds
work better by giving them better tools to
work with.
An obvious example is writing: before
people could write things down, men could
only learn what they experienced or were
told by others in person; writing changed
all that. Within the computer-screen fra¬
ternity, the next step is obvious; screens
can double and redouble our intellectual
capacities. But this is not obvious to every¬
body. Engelbart, patiently Instructing those
outside, came up with a beautiful example.
To show what he meant by the Augmentation of
Intellect, Engelbart tied a pencil to a brick .
Then he actually made someone write with it.
The result, which was of course dreadful, En¬
gelbart solemnly put into a published report.
Not yet being able to demonstrate the aug¬
mentation of intellect, since he had as yet
no system to show off, he had masterfully de¬
monstrated the disa ugmentation of intellect:
what happens if you make man's tools for work¬
ing out his thoughts worse instead of better.
As this poor guy was with his brickified pen¬
cil, explained Engelbart, so are we all among
our bothersome, inflexible systems of paper.
Starting small, Engelbart programmed up
a small version of what most fans call "The
Engelbart System" some ten years ago. One
version has it that when it came to looking
for grants, management thought he acted too
kooky, and so assigned a Front Man to make
the presentation. But, as the story goes,
the man from ARPA (see "Military...", p. )
pointed at Engelbart and said, "We want to
back him ."
A small but dedicated group at SRI has
built up a system from scratch. First they
used little CDC 1700 minicomputers; then,
various grants later, they were able to set
up their own PDP-10, in which the system now
resides, and from which it reaches out ac¬
ross the country.
Doug calls his system NLS, or "oN-Line
System." Basically It is a highly responsive,
deeply-structured text system, feeding out to
display terminals. From a terminal you may
read anything you or others have written, and
write with as-yet-unmatched flexibility.
The display terminals are all over. The
project has gone national, though at great ex¬
pense: through the ARPA net of computers, you
can in principle become a user of NLS for
something like $50,000 a year.
THE "KNOWLEDGE WORKSHOP"
For a lucky fifty or so people, Engelbart '9
system is Horae. Wherever they are— at Stan¬
ford Research Institute or far away on the
ARPAnet— a whole world of secretarial and
communication services is at their fingertips.
The user has but to call up through his dis¬
play terminal and log on. At that point all
his written files, and numerous files shared
among the users, are at his fingertips. He
may read, write, annotate the croBs-link.
(Engelbart's system has provision for col¬
lateral structuring: see "Thinkertoys," i^TZ..)
He may send messages to others in the Workshop.
He may open certain of his files to other
people, and read those that have been opened
to him.
This all has a certain vagueness if you
do not understand how bound you are today by
paper— the problems of finding it, sorting
it, looking things up. (If you write , that
is, write a lot , you know all too well how
intractable is paper, what a damned nuisance.)
With a system like Engelbart's, now, whatever
is written is instantly there . Whatever you
want to look up is instantly there , simultan¬
eously Interconnected to everything else it
should be connected to— source materials,
footnotes, comments and so on. A document is
completed the moment It is written: no human
being has to retype it. (It need not be typed
on paper at all, if it's just for the workshop
members: a printout is only needed if it has
to go to someone outside the system.)
In many ways, Engelbart's system is a pro¬
totype for the world of the future, I hope.
ALL HANDLING OF PAPER IS ELIMINATED. Whatever
you write, you write on the screens with key¬
board and pointer. (No more backs of envelopes,
yellow pads, file cards, typewriters.) What¬
ever you transmit to fellow users of the system
you simply 'release'— no physical papet changes
hands.
The group has also worked out some remark¬
able techniques for collaborative endeavor.
Two people— say, one in California and one in
New York— can work together through their
screens, plus a phone link; it's as if they
were side-by-side at a magic table. Each sees
on his screen what the other sees; each controls
a moving dot (or "cursor") that shows where he's
pointing. The effect Is somewhere between a
blackboard and a desk; both may call up docu¬
ments, point things out in them, change them,
and anything else two people might do when work¬
ing on something together.
Engelbart meets with someone
far away , as others watch.
THE SYSTEM ITSELF
Basically the system la a large-scale setup
for the storage, bringing forth, viewing and
revision of documents and connections among them.
The documents are stored (of course) in
alphabetical codes. Connections among them,
or other relations within them, are signalled
by the presence of other codes within them;
these are ordinarily not displayed, however,
except as directed by a particular display
program and display programs can of course
vary.
There are various programs for display,
in large part depending on what sort of
screen system the individual user has.
(NLS is used with everything from high-reso¬
lution line-drawing screens converted to 1000-
line television, down to inexpensive Delta
Data terminals— a brand, incidentally, that
allows text motion, which most don't} Engel¬
bart’ 8 system is extremely general , allowing
the creation of files having all kinds of
structures, and display programs in all kinds
of styles. (I hope that this side of the pre¬
sent book conveys a sense of how many styles
that can be.) However, most users are devoted
to certain standardized styles of working that
have been well worked out and permit the easy
sharing of material and of operating practices.
Here, for instance, is^tandard screen layout:
View i^oic^torT"
- W? u*»T „
you're
Yoot CORRECT T* WL$ 1
(what r«v rfp< i«a
WAY |( HtesJ
FlLt klliyJJDOk) L
FM_t UlUDoud 2.
Two separate panels of text appear, and links
may be shown on them. (Thus it's a thinkertoy—
see p. .) Two little windows at the top re¬
mind you of what you're seeing and what you're
asking for. We can't get into the rest of it
here
THE COMMAND LANGUAGE
NLS has a command language which all
users must learn. While it is a stream¬
lined and straightforward command language,
nevertheless it requires the user to type
in a specific sequence of alphabetical
characters every time he wants something
done. (This Is acceptable to computer-
oriented people; I suspect it would not
be satisfactory, say, for philosophers
and novelists. For designs oriented to
such users, see JOT (p P'5’0) and Carmody’s
System, nearby. Parallel Textface (p^Vj)
and,Th3 (p.^9T).)
Incidentally, NLS users may also employ
a cute little keyboard, something like a
kalimba, that allows you to type with one
hand ■ You simply type the six significant
ASCII bits (see chart p. ) in one "chonf*
— it sounds hard but is easy to learn.
Sample commands: I (insert), D (delete),
M (move or rearrange). Then you point with
the mouse.
MOUSE?
The Engelbart Folks have built a pointing
device, for telling the system where you're
pointing on the screen, that is considerably
faster and handier than a lightpen. (Unfor¬
tunately, I don't believe it’s commercially
available.) It's called The Mouse.
The Engelbart Mouse is a little box with
hidden wheels underneath and a cable to the
terminal. As you roll it, the wheel's turns
are signalled to the computer and the comput¬
er moves the cursor on the screen. It's fast
and accurate , and in fact beats a lightpen
hands down in working speed.
Through the comnand language, NLS allows
users to create programs that respond in all
sorts of ways; thus the fact that certain text¬
handling styles are standard (as in above il¬
lustration of screen layout) results more from
tradition than necessity.
£8
DM 4 7
it w
Hypertext 1* non-aaquential writing. It'* no good to u*,
though, un1e*• we can go instantly in a choica of direction*
froei a given point.
Thia of course can only naan on computer display screens.
Engelbart's systen, now, was mainly designed for people who
wanted to inmerse themselves in it and learn its conventions.
Indeed, it night be said to have been designed for a ccomrunity
of people in close contact, a sort of syatea of blackboards and
collaborative talking papers.
A more elemental system, with s different elant, was put
together at Brown U. on IBM equipment. Ha'll refer to It here
as "Carmody's System,” after the young programmer whose name
came first on the writeup.
Carmody's system runs on an IBM 360 with 2250 display.
While the 2250 is a fine piece of equipment, the quirks of the
360's opersting system (see p. *f f ) often delay the user by
making him wait, e.g., for someone else's cards to get punched
before it reeponds to his more imnediate uses) this is like
making ice-skatara wait for oxcarts.
Anyway, the system essentially imposes no structure on
the materiali it may consist of text segments of any length
and ties and links between them. An asterisk appearing any¬
where in one piece of text signals a possible jisnp, but the
reader doesn't necessarily know where toi rapping the asterisk
with the lightpen takes you there, however.
The same apparently la true of the data
structure. 1 used to be somewhat disturbed
at the way Engelbart 1 * text systems seem to
be rigorously hierarchical. This In fact is
the case, in the aense that having multiple
dlecrete levels is built deep into the system.
But it turns out to be harmless. The stored
text is divided by the storage techniques in¬
to multiple levels, corresponding to a Harvard
outline. Think of it as something like this:
1. HIERARCHICAL FORMAT
A. STORAGE
B. DISPLAY
C. LANGUAGE
But let's expand this example a little:
1. HIERARCHICAL FORMAT
A. STORAGE
Al. Everything in NLS is stored
with hierarchical codes.
A2. Their effect depends on the
display.
B. DISPLAY
Bl. The hierarchical codes of
NLS have no consequences In
particular .
B2. The hierarchical codes for
NLS can splay the material
out into a variety of dis¬
play arrangements.
B2A. They can be displayed
in outline form.
B2B. They can be displayed
In normal text form.
B2C. These dratted numbers
can even be made to
disappear.
C. LANGUAGE
Cl. The conaand language deter¬
mines what the display shows
of the hierarchical structure.
C2- What is shown can be deter¬
mined by s program in the
cosxaand language. (For in¬
stance, "how many levels
down" it is being shown).
C2A. This is four levels
down. (The earlier
example wasn’t.)
C3. The display format all de¬
pends on what display pro¬
gram you use, in the NLS
consaand language.
That's enough of that. I can't help re¬
marking that 1 still don't like that sort of
structuring, but it is deep Ln NLS, and if
you don’t like it either (poor deprived lucky
user of NLS) you can program it to disappear,
so it's hardly in your way.
BY THE BEARD OF THE PROPHET!
This is stark and simple. It could also get you good
and lost. However, a simple technique took care of that:
everyfcime the user jumped, the address of his previous
location was saved on a stack (see "The Magic of the Stack,”
p. f7_). The user also had a RETURN button: when he wanted
to go back to where he had last jumped from, the system
would pop the last address off the top of the stack, and
take him there. (This feature was adapted from my 1967
Stretchtext paper, and turned out to work out quite well
in practice.)
The system also had handy features for light-pen text
editing, and various nice printout techniques. All told,
it was a clean and powerful design. While it lacked higher-
level visualization facilities, like Engelbart's display of
Levels (see "outline” in Engelbart article) or collateral
display (see "Thinkertoys," pDATZ), it was in some ways suited
for naive users; that is, it was eventually fairly safe to use,
and could in large part be taught to rank beginners in a couple
of hours— provided they didn’t have to know about JCL cards.
It is left for the reader to figure out interesting uses
for it. How would you do collateral structures? How could
you signal to a reader which of several pieces of text a jump
was to?
(At least one real hypertext was actually written on this
system. It tied together a lot of patents for multilayer elec¬
trodes. Readers agreed that they could learn more from it about
multilayer electrodes than they had imagined wanting to know.)
BIBLIOGRAPHY
Steven Carmody, Walter Gross, Theodor H. Nelson, David Rice
and Andries van Dam, "A Hypertext Editing System for the
360." In Faiman and Nievergelt (edo.). Pertinent Concepts
in Computer Graphics (U. Ill. Press ’69), 291-330.
Note: Mr. Gross now goes by the name of Lightning Clearwater.
Go/poi V
Thie oontinuee the remarks on Gordon Paak
begun on p.
Engelbart in German means Angelbeard; Doug
Engelbart is Indeed on the aide of the angels.
In building his mighty system he points a new
way for humanity. The sooner the better. Any
history of the twentieth century will certainly
hold him high. Few great men are also such
nice guya.
BIBLIOGRAPHY
Douglas C. Engelbart, Richard W. Watson 6 James
C. Norton, "The Augmented Knowledge Workshop."
Proc NCC 73, 9-21.
Charles H. Irby, "Diaplay Techniques for Inter¬
active Text Manipulation." Proc NCC 74,
I will npw try to describe Pask's work
as he has explained it to me. Perhaps this
will be of some help to those who may have
been mystified or dumfounded by contact with
this fabulous man.
Cordon Pask's concern is abstraction and
how concepts are formed, whether in a creature
of nature or a robot or a computer program.
Abstraction is of interest primordially (as life
evolved thinking capacity), psychogenetically
(as the mind acquires new facilities, described
most peculiarly by Piaget), and epistemological¬
ly (how do we know? Like, how do we know . man?),
and methodologically (how can we most effectively
find out more?).
ilis interest, then, is in teaching by
allowing students to discover exact relations
in a specific subject matter by the very pro¬
cess of abstraction that is of so much interest.
The Aupnentation of Intellect. Infamous Ape Sequence from my elide-ahou.
what he does, then. Is prepare given
fields of learning so that they can be studied
by students using abstractive methods, without
guidance.
This preparation basically has two steps.
First he sets up the whole field. This is
done in collaboration with a "subject matter
Wh0 " ames the im P°rtant topics in
the field and states what interconnections
they have. The result is a complex graph
structure (see p. u> ) which Pask cills a
conversational domain . It comes out to huge
diagrams of labels and lines between them.
~^en Pask processes this structure to
make a more usable map of the field that he
calls an entailment structure . The processing
basically involves removing "cycles" in the
graph, thus making the structure hierarchical
in a slightly artificial way justified by what
the subject-matter-expert has said is the
structure of the field.
(This processing is carried out by a pro¬
gram called EXTEND.)
The resulting Entailment Structure is
then presented to the student as a great map
of the field which he may explore.
Pask intends that the student's explor¬
ations, will consist of testing analogies, or
what Pask calls morph isms . to find the exact
structures of knowledge he is supposed to
be acquiring. This knowledge will be in the
form of isomorphisms , or exact analogies, i.e.
Pask's overall system,examples of which
he has running in his laboratory in England,
he calls CASTE (Course Assembly System and
Tutorial Environment). A further development,
which is to be put on a PDP-11/45 computer
(see p. and p. H ) at the Brooklyn Chil¬
dren's Museum, is called THOUGHT-STICKER.
This program is intended to allow the demon¬
stration and testing of analogies directly,
by children.
PASK AND HYPERTEXT
Gordon Pask's work is remarkably similar
to my own stuff on hypertext.
Essentially Pask is reducing a field to
an extremely formal structure of relations
which may then be studied b£ the student , at
the student's initiative .
(What I don't quite understand is how the
analogies are to be explored and tested.)
Anyway, a principal point is that the
student is in control and may use his initia¬
tive dynamically; the subject is not artifi¬
cially processed into a presentational se¬
quence. Moreover, the arbitrary interconnec¬
tions of the subject, which are no respecters,
of the printed page, are recognized as the
fundamental structures the student must deal
with and come to understand. On all these
points Pask and I are in total agreement.
Indeed, his explorable systems-- (I don't
know if they will be what I elsewhere call
hypergrams or responding resources)-- will be
fascinating, fun and terrifically educational.
Because he is.
Now it turns out that this exactly com¬
plements the notion of hypertext as I have been
promulgating it lo these many years.
Hypertext is non-sequential text. If we
write a hypertext on something, it will be
most appropriate i7“we give it the general
interconnective structure of the field. In
other words, the interconnective structures
chosen for the textual parts are likely to have
the same connective structure (in general) as
Pask's Entailment Structure.
For another kind of hypertext, the antho-
logical hypertext built up of lots of other
writings, it is also reasonable to expect the
connective structures to cluster to the same
general form as Pask's entailment structure.
In other words, the very same field of
knowledge Pask is out to represent as an ex¬
plorable, formalized whole, I am out to repre¬
sent as an explorable jjnformalized whole, with
anecdotes, jokes, cartoons, "enrichment mater¬
ials," and anything else people might dig.
In still other words, let's have both
and call it a party.
You oan't read the eoreen here.
It eaye: C0GIT0 ERGO SUM
Actually it needs
the '2001' music.
MEDIA
fffLtv effect svrw
A^e THE NEW FRPNTlCJt
FANTICS
— 5UT >rs SHOWM^tf
TRKT'S PfEAMOOllT,
NOTAVW TtCMVjICM SWACfV
Ah, Love 1 could you end I with Him compile
To £T»»p this lorry Scheme of Tbingi entire,
Would not we (better it to bits—end then
Re mould it neerer to tbe Heert’s Desire I
Whet people don’t mi is how computer technology now
makes poealble the revision end Improvement— the trans¬
formation— of ell our media. It "eounde too technical,”
But thle le the baelc misunderstanding: the funda¬
mental laeuee are NOT TECHNICAL. To underatend this la
basically a matter of MEDIA CONSCIOUSNESS, not technical
knowledge.
, Uo4 # rtii itfl.
PR OBLEMS, PERILS, AND PROM ISES OP COMPUTER QRAPHTr*
John B. Macdonald
Research Leader
Computer Applications: Graphics
Western Electric Company
Engineering Research Center
A lot of people have acute media consciousness. But
some people, like Pat Buchanan and the couaaunards, suggest
that there la something shabby about this. Many think.
Indeed, that we live In a world of false Images promulgat¬
ed by "media," a situation to be corrected. But this Is
a misunderstanding. Many Images are false or puffy, all
right, but It la incorrect to suppose that there Is any
alternative. Media have evolved from simpler forme, and
convey the background Ideas of our time, aa well as the
fade. Media today focus the Impressions and Ideas that
In previous eras were conveyed by rituals, public gather¬
ings, decrees, parades, behavior in public, mummer’ troup¬
es... but actually every culture Is s world of Images. The
chieftain In his palanquin, the shaman with his feathers
and rattle, are telling us something about themselves and
about the continuity of the society and position of the
individuals in it.
K ? K aome aeri nieiona which may be
obvious but bear repeating.
1 * (l^profn® 18 th * appllcatlon of »cl«nce for
2. Computer craphlco does not make possible
anything that was previously Impossible; It
can only Improve the throughput of an existing
process, 0
3. A successful appllcatlon of computer graphics
Is when over a period or rive years the cost
savings from improved process throughput ex¬
ceed the costs of hardware, software, maln-
tenance and Integration Into an existing process
FANTICS
Eduard Fitzgerald.
Almost everyone seems to agree that Mankind (who?)
la on the brink of a revolution in the way information
Is handled, and that this revolution Is to come from
some sort of merging of electronic screen presentation
and audio-visual technology with branching, Interactive
computer systems. (The naive think "the" merging Is
Inevitable, as if "the" merging meant anything clear.
I used to think that too.)
Professions! people seem to think this merging will
be an intricate mingling of technical specialties, that
our new systems will require work by all kinds of commit¬
tees and consultants (adding and adjusting) until the Re¬
sults— either specific productions or overall Systems—
are finished. Then we will have to Learn to Use Them.
More consulting fees.
I think this Is a delusion and a con-game. I chink
that when the real media of the future arrive, the small¬
est child will know it right away (and perhaps first).
That, Indeed, should and will be the criterion. When you
can’t tear a teeny kid away from the computer screen,
we'll have gotten there.
We are approaching a screen apocalypse. The author's
basic view la that RESPONSIVE COMPUTER DISPLAY SYSTEMS
CAN, SHOULD AND WILL RESTRUCTURE AND LIGHT UP THE MENTAL
LIFE OF MANKIND. (For a more conventional outlook, see
box nearby, "Another Viewpoint.")
I believe computer screens can make people happier,
smarter, and better able to cope with the copious prob¬
lems of tomorrow. But only if we do right, right now,
WHY?
The computer's capability for branching among
events, controlling exterior devices, controlling
outside events, and mediating in all other events,
makes possible a new era of media.
Until now, the mechanical properties of exter¬
nal objects determined what they were to us and how
we used them. But henceforth this is arbitrary.
The recognition of that arbitrariness, and re¬
consideration among broader and more general alter¬
natives, awaits us. All the previous units and
mechanisms of learning, scholarship, arts, transac¬
tion and confirmation, and even self-reminder, were
based In various ways upon physical objects— the
properties of paper, carbon paper, files, books
and bookshelves. To read from paper you must move
the physical object in front of you. Its contents
cannot be made to slide, fold, shrink, become trans¬
parent, or get larger.
But all this Is now changing, and suddenly. The
computer display screen does all these things if desired,
to the same markings we have previously handled on paper.
The computer display screen is going to become universal
very fast; this Is guaranteed by the suddenly rising
cost of paper. And we will use them for everything.
This already happens wherever there are responding com¬
puter screen systems. (I have a friend with two CRTa on
his desk; one for the normal flow of work, and one to
handle interruptions and aide excursions.) A lot of
forests will be saved.
Now, there are many people who don't like this idea,
and huff about various apparent disadvantages of the
screen. But we can improve performance until almost
everyone is satisfied. For those who say the screens are
"too small," we can Improve reliability and backup, and
offer screens everywhere (so that material need not be
physically carried between them).
The exhilaration and excitement of the coming time
is hard to convey on paper. Our screen displays will be
alive with animation in their separate segments of activ¬
ity, and will respond to our actions as If alive physic¬
ally too.
Now the media, with all their quirks, perform the
same function. And If we do not like the way some things
are treated by the media, in part this stems from not
understanding how they work. "Media," or structured trans¬
mission mechanisms, cannot help being personalized by
those who run them. (Like everything else.) The problem
la to understand how media work , and thus balance our un¬
derstanding of the things that media misrepresent.
THOUGHTS ABOUT MEDIA:
1. ANYTHING CAN BE SAID IN ANY MEDIUM.
Anything can be said In any medium,and Inspiration
counts much more than 'science'. But the techniques which
are used to convey something can be quite unpredictable.
There has always been, but now is newly, a
UNITY OF MEDIA OPTIONS. You can get your message
across in a play, a tract, a broadside, a textbook,
a walking sandwich-board, a radio program, a comic
book or fumettl, a movie, a slide-show, a cassette
for the Audi-Scan or the AVS-10, or even a hypertext
(see p.}>*lH(,).
(But transposing can rarely preserve completely
the character or quality of the original.)
3. BIG AND SMALL APPROACHES
What few people realize is that big pictures can
be conveyed in more powerful ways than they know. The
reason they don't know it Is that they see the content
In the media, and not how the content Is being gotten
across to them— that in fact they have been given very
big pictures Indeed, but don’t know it. (I take this
point to be the Nickel-Iron Core of McLuhanlsm.)
People who want to teach In terms of building up
from the small to the large, and others who (like the
author) like to present a whole picture flrat , then
fill in the gaps, are taking two valid approaches.
(We may call these, respectively, the Big Picture ap¬
proach and the Piecemeal approach.) Big pictures are
Just as memorable as plcky-pieces 1JE they have strong
Insights at their major intersections.
By "fantics" I mean the art and science of getting
Ideas across, both emotionally and cognitively. "Presenta¬
tion" could be a general word for it. The character of
what gets across Is alvaya dual: both the explicit etruc-
ture^and feelings that go with them. These two aspects,
exactness and connotation, are an Inseparable whole; what
is conveyed generally has both. Tbe reader or viewer al¬
ways gets feelings along with Information, even when the
creators of the information think that Its "content" is
much more restricted. A beautiful example: ponderous
"technical" manuals which carry much more connocatlvely
than the author realizes. Such volumes may convey to
some readers an (Intended) Impression of competence, to
others a sense of the authors' obtuaeneas and non-lmaglna-
tlon. Explicit declarative structures nevertheless have
connotative fields; people receive not only cognitive
structures, but Impressions, feelings snd senses of things.
Fancies is thus concerned with both the arts of ef¬
fect— writing, theater and so on-end the structures and
mechanisms of thought, including the various traditions of
the scholarly event (article, book, lecture, debate and
class ). These are all a fundamentally inseparable whole,
and technically-oriented people who think that systems to
Interact with people, or teach, or bring up Information,
can function on some "technical" basis— with no tle-lns
to human feelings, psychology, or the larger social struc¬
ture— are kidding themselves and/or everyone else. Sys¬
tems for "teaching by computer," "information retrieval,"
and so on, have to be governed In their design by larger
principles than moat of these people are willing to deal
with: the conveyance of images. Impressions and ideas.
This Is what writers and editors, movie-makers and lectur¬
ers, radio announcers and layout people and advertising
people are concerned with; and unfortunately computer
people tend not to understand It for beans.
In fantics as a whole, then we are concerned with:
1. The art and science of presentation. Thus It na¬
turally includes
2. Techniques of presentation: writing, stage dir¬
ection, movie making, magazine layout, sound overlay,
etc. and of course
3. Media themselves, their analysis and design;
and ultimately
4. The design of systems for presentation. This
will of course Involve computers hereafter, both concept¬
ually and technically; since it obviously Includes, for the
future, branching and intricately interactive systems en¬
acted by programmable mechanisms, l.e. computers. Thus
computer display, data structures (and, to an extent,
programming languages and techniques) are all a part.
Fantlcs must sIbo include
5. Psychological effect and Impact of various presen¬
tational techniques— but not particular formal aesthetics,
as of haiku or musical composition. Where directly rele¬
vant fantlcs also includes
6. Sociological tie-ins'— especially Bupportlve and
dysfunctional structures, such as tie-ins with occupational
structure; sponsorship and couraercials; what works in schools
and why. Most profoundly of all, however, fantlcs must deal
with psychological constructs used to organize things:
7. The parts, conceptual threads, unifying concepts
and whatnot that we create to make aspects of the world un¬
derstandable. We put them Into everything, but standard¬
ize them in media.
For example, take radio. Given in radio— the tech¬
nological fundament— la merely the continuous transmission
of sound. Put into It have been the "program," the aer ¬
ial (and thus the episode ), the announcer , the theme song
and the musical bridge — conventions which are useful pre-
sentationally.
The arbitrariness of such mental construct# ahould
be clear. Their usefulness in mental organization perhaps
la not.
The question Is, then: HOW WILL WE USE THEM? Thus
the design of screen performances and environments, and
of transaction and transmission systems. Is of the high¬
est priority.
THE FRENCH HAVE A WORD FOR IT
In French they use the term 1*Informatique
to mean, approximately, the presentation of ln-
formation to people by automatic equipment.
Unfortunately the English equivalent,
informatics . has been preempted. There is a
computer programming firm called Informatics,
Inc., and when I wrote them about this in the
early sixties they said they did not want their
name to become a generic term. Trademark law
supports them in this to a certain extent.
(Others, like Wally Feurteig, want that to be
the word regardless.) But in the meantime
I offer up the term fantics, which is more
general anyhow.
<t. THE WORD-PICTURE CONTINUUM
The arts of writing and diagramming are basically
a continuum. In both cases the mental Images and cogni¬
tive structures produced are a merger of what la heard
or received. Words are slow and tricky for presenting
a lot of connections; diagrams do this well. But dia¬
grams give a poor feel for things and words do this
splendidly. The writer presents exact statements, in
an accord-structure of buts and lndeeds, molded in a
structure of connotations having (If the writer is
good) exact impreciseness . This is hardly startling:
you're always selecting what to say, and the use of
vague words (or the use of precise-sounding words va¬
guely) Is simply a flagrant form of omission. In dia¬
grams, too, the choice of what to leave in and out, how
to represent overweening condition*and forces and exemp¬
lary details, are highly connotative. (Great diagrams
are to be seen in the Scientific American and older
Issues of TIME magazine.)
This word-picture continuum is just a part of tha
broader continuum, which I call Fantlcs.
Let's take a surprise example, nothing electronic
about It.
Many "highways" are wholly fictitious— at least to
begin with. Let's say that a Route 37 le created across
the state: that number is merely a series of signs thst
users can refer to aa they look at their maps and travel
along.
However, aa time goes by, "Route 37" takes on s cer¬
tain reality aa a conceptual entity: people think of It
as a thing . People say "Just take 37 straight out"
(though It may twist and turn); groups like a Route 37
Merchants' Aasociation, or even a Citizens to Save Scenic
.37, may spring up.
What was originally simply s nominal construct, then,
becomes quite real aa people organise their lives around
it.
This all seems arbitrary but necessary in both high¬
ways snd radio. What, then, does It have to do with the
new electronic media?
Simply Chit: till now the structures of media somehow
aprang naturally from the nature of thinge. Now thejf don t
anymore . Radio, books and movies have a natural Inner dy¬
namic of their own, leading to atich conatructa. While
this may prove to be ao for computer media as well (—aa I
argued in "Getting It Out of Our System," cited p.
then again it may not. In other words, WE MUST ACKNOWLEDGE
THAT WE ARE INVENTING PRESENTATIONAL TECHNIQUES IN THE NEW
MEDIA, not merely transporting or transposing particular
things into them because they seem right. The paychologl-
cal constructs of man -machine systems may turn out^ t£ be,
jTfgely arbitrary . Thus bringing to terminal system* con¬
ventions like dialogue instruction ("CAl"), or arbitrary
restrlctiona of how thinge may be connected, presented or
written on the computer may be a great mistake.
The highway-number analogy continues. The older
highways had numbers for convenience, and our travels be¬
came organized around them, and particular highways (like
"U.S. 1" and "Route 66") came to have special character.
But now with the Interstates, a highway la a planned ,
sealed unit , no longer just a collection of roads gather¬
ed together under a name.
This unit, the Interstate, is not merely a psychologi¬
cal construct, but a planned structure. Knowing what works
and what doesn't in the design of fast highways, the Inter¬
states were built for speed, structured as closed units.
Designing them with limited access has been a conscious
decision in the system design for well-based reasons, no£
a chance structure brought in from horse—and buggy days.
Now, the constructs of previous media— writing, films,
other arta— evolved over tine, and in many cases may have
found their way to a "natural" form. But because of the
peculiar way that computer media are currently evolving
/—under large grants largely granted to professionals who
use very large words to promote the idea that their origi¬
nal professions are largely applicable-- ), this sort of
natural evolution may not take place. The new constructs
of computer media, especially computer screen-media, may not
have a chance to be thought out. We need designs for screen
presentations and their mixture— vignetting, Windows,
screen mosaics, transformed and augmented views, and the
rapid and comprehensible control of these views and windows.
We are still Jusc beginning to find clever viewing tech¬
niques, and have hardly begun to discover highly respon¬
sive forms of viewability and control (cf. collateration
in "Thinkertoys," and Knowlton's button-box
(See T. Nelson, "A Conceptual Framework for
Man-Machine Everything," cited p. , and material on
controls, below.)
THE MIND’S UNIFICATION
One of the remarkable things about the human mind
is the way it ties things together. Perceptual unity
comes out of nowhere. A bunch of irregular resi¬
dential and Industrial blocks becomes thought of as "my
neighborhood." A most remarkable case of mental uni¬
fication is afforded by the visage of our good friend
Mickey Mouse. The character is drawn in a most para¬
doxical fashion: two globelike protrusions (representing
the ears) are in different positions on the head , depend¬
ing on whether we view him from the front or the side.
No one finds this objectionable; few people even notice,
it seems.
THE PARADOXICAL AHATOMY OF MICKEY MOUSE
MICKEY MOUSE (frontal) (lateral)
POSSIBLE RECONCILIATIONS: Rolling
Diagonal Mounting Relative
What this shows, of course, is the way the mind can
unify into a consistent mental whole even things which
are inconsistent by normal rules (in this case, the rules
of three-dimensional structure).
Even perceptions are subject to the same principle
of unification. The fingernail is an excrescence with no
nerves in it; yet somehow you can feel things with your
fingernails — tying together disparate sensations into
a unified sense of something in the world (say, a coin
you're trying to pick up). In the same way, an experienc¬
ed driver feels the road ; in a very real sense, the car's
wheels and suspension become his own sensory extensions.
This principle of mental unification is what makeb
things come together, both literally and figuratively,
in a fantic field. A viewer sees two consecutive movie
shots of streets and unifies them into one street; controls,
if you are used to them, become a single fused system of
options; we can have a sense of a greater whole, of which
one view on a Bcreen Is a part.
W GiM, m wyiui
IS NO T m OOK_ SURS
iOT IN OU«.StRMeS.
CONTROLS: THEIR UNIFICATION AND PEEL
Controls are intimately related to screen presenta¬
tion, just as arbitrary, and just as important.
The artful design of control systems is a deeply
misunderstood area, in no way deconfused by calling it
human factors." There are many functions to be control¬
led, such as text editing operations, views of the uni¬
verse on a screen, the heading of a vehicle, the tilt of
an aircraft, the windage and adjustments of artillery,
the temperature of a stove burner and any other control¬
lable devices. And nowadays any conceivable devices
could control them— pushbuttons, knobs, cranks, wheels,
levers and joysticks, trigger, dials, magic wands, mani¬
pulation by llghtpen on CRT screens (see p^Ti), flicks
of the finger, the turning o_f the eyes (as in some ex¬
perimental gun-aiming devices), the human voice (but
that introduces problems— see p.J)*l3), keyboards, elec¬
tronic tablets, frigelbart mice and cbordwrlters, and so
The human mind being as supple as it is, anything
whatever can be used to control systems. The problem is
having it be a coaprehenalblc whole .
As already remarked, our ability mentally to unify
things is extraordinary. That we aomehow tie together
clutch, gear, accelerator and brake into a comprehensible
control structure to make care go and stop should amaze
and Instruct.
DM 49
;- , " ' lne accoroance-atructure of writing
Uee 'Writing," p.^iYl) movee it along emoothly, fantic
eaign that bulide from a we11-organized Internal dy-
namic ahouid confer on a fantic ay.tem the aame momentum
and clarity that carefully-organized writing hea.
Engineers and "human factora" people apeak as though
there were some kind of scientific or determinate way to
design control systems. Piffle. We choose a set of con¬
trols, much like an artist's Palette, on the basis of ge¬
neral appropriateness; and then try best and most artistic¬
ally to fit them to what needs doing.
The result must be conceptually clear and retroactive¬
ly "obvious"— simply because clarity is the simplest way
to keep the user from making mistakes. Clear and simple
systems are easier to learn, harder to forget, less likely
Co be screwed up by the user, and thus arc more economic¬
al— getting more done for the resources put in.
There is a sort of paradox here. The kinds of con¬
trols are totally arbitrary, but their unification in a
good system is not. Smoothness and clarity can come from
disparate elements. It is for this reason that I lay par¬
ticular stress on my JOT system for the input and revision
of text, using a palette of keys available on the simplest
standard computer terminal, the 33 Teletype. I cannot
make the final judgement on how good this system is, but
it pleases me. JOT la also an important example because
it suggests that a conceptually unified system can be
created from the artful non-obvious combination of loose
elements originally having different Intended purposes.
Mental analogy is an important and clear control
technique. We tend to forget that the steering wheel was
Invented , separately replacing both the boat's tiller and
the automobile's tiller. We also forget that the use of
such steering mechanisms must be actually learned by
children. Such continuous analogies, though, require cor¬
responding continuities in the apace to be controlled—
an important condition.
Simplicity and clarity have nothing to do with the
appearance of controls, but with the clarity and unique
locatability of individual parts. For this reason I find
deplorable the arrayed controls that are turning up, e.g.
on today's audio equipment. Designers seem to think
rows of things are desirable. On the contrary: the best
designed controls I ever used are on the Sony TC-50
pocket tap^ recorder
- frgm eh
but of course this is now phased out; Instead most cassette
recorders have five or six stupid buttons in a row. (Was
it too good to last?)
Spurious control elegance comes in many guises. Con¬
sider Bruce McCall's description of the Tap-A-Toe Futuroi-
dic Footless De-Clutching tm system. This was offered on
the fictitious 1934 Bulgemobiles, and allowed you to drive
the car with one pedal, rather than three (see box nearby).
Careless and horrible designs are not all fictitious.
One egregious example also indicates the low level of de¬
sign currently going into some responding systems: comput¬
er people have designed CRT writing systems for newspapers
which actually have a "kill" button on the con6ole, by
which authors would accidentally kill their stories. In
a recent magazine article it was explained thac the event¬
ual solution was to change the program so that to kill
the story you had to hit the "kill" button twice ■ To me
this seems like a beautiful example of what happens when
you let Insulated technical people design the system for
you: a "kill" button on the keyboard is about as intelli¬
gent as installing knives on the dashboard of a car,
pointing at the passenger.
There is another poor tendency. When computer pro¬
grammers or other technical people design particular
systems without thinking more generally, things are not
likely to be either simple or combinable. What may re¬
sult is intricate user-level controls for one par tic ular
function, controls that are differently used for another
particular function, aiaking the two functions not com¬
binable.
What makes for the beat control structures, then?
There is no simple answer. I would say provisionally
that it is a matter of unified and conspicuous constructs
in the mental view of the domain to be controlled,
corresponding to a well-distinguished and clearly-inter¬
related set of controlling mechanisms. But that is hardly
the last word on the subject.
THE ORGANIZATION OF WHOLENESS
It should be plain that in responding screen-
systems, "what happens on the screen" and "how the
controls respond" are not really distinguishable.
The screen events are part of the way the controls
respond. The screen functions and control functions
merge psychologically.
Now, there is a trap here. Just as the gas
pedal, clutch, gearshift and brake merge psychologi¬
cally, any control structure can merge psychological¬
ly. Clutch and gear shift do not have, for moat of us,
clear psychological relevance to the problem of con¬
trolled forward motion. Yet we psychologically inte¬
grate the use of these mechaniemB as a unified means
for controlling forward motion (or, like the author,
get an Automatic). In much the same way, any system
of controls can gradually come through use to have a
psychological organization, even spuriously. The trap
is that we so easily lose sight of arbitrariness and
even stupidity of design, and live with it when it
could be ao much better, because of this psychological
melding.
. ; - - —v.i complication! ot a system have
been carefully streamlined and amoothed back, at least
as they affect the user Consider the design of the JOT
text editing system (p.***?): while it la simple to tha
rHr! ^ omp “ ,:er P*°P le often reset to it with indignation
and anger because it hide, what are to them the signifi¬
cant features of computer text edltlng-^ipliclt pre¬
occupation with storage, especially the calling and re¬
vision of "blocks." Nevertheless, I say it is the de¬
tails at this level which must be smoothed back if we
are to make systems for regular people.
The same applies to the Th3 system (see p. Dlt <T*T )
which is designed to keep the user clear-minded as he
compares things in multiple dimensions. The mechanisms
at the computer level must be hidden to make this work.
FANTIC SPACE
Pudovkin and Eisenstein, great RuBaian movls-aakers
of the twenties, talked about "filmic space"— the imagin¬
ary space that the action seems to be in.
This concept extends Itself naturally to fantic space ,
the space and relationships sensed by a viewer of any me¬
dium, or a user in any presenting or responding environ¬
ment. The design of computer display systems, then, is
really the artful crafting of fantic space . Technicalities
are subservient to effects. (Indeed, I think computer
graphics is really a branch of movie-making.)
FANTIC STRUCTURE
The fantic structure of anything, then, consists of
its noticeable parts, interconnections, contents and ef¬
fects.
I claim that it is the fantic unity — the conceptual
and presentational clarity of these things— that makes
fantic systems— presentational systems and material—
clear and helpful, or not.
Let us take an interesting example from a system for
computer-assisted Instruction now under implementation.
I will not Identify or comment on the system because per¬
haps I do not understand It sufficiently. Anyway, they
have an array of student control-buttons that look like
this'. •
OEJ
tjeif
AS>VIC£
K\Ar
MKKR
easier
fcyiE
--
EMMP
[exa^le]
fMtr
The general thinking in this system aeema to be
that the student may get an overall organizing view of
what he is supposed to be learning (MAP); information on
what he is currently supposed to be about (OBJ); canned
suggestions based on what he's recently done (ADVICE).
Morjbver, he can get the system to present a rule about
the subjecc or give him practice; and for either of
these he may request easier rules or practice, or harder
rules (i.e., more abstruse generalities) or harder prac¬
tice.
For the latter, the student is supposed to hit
RULE or PRACT followed by HELP, HARDER or EASIER, viz.:
OBJ
Help
_/ l
AMcf
m }
— A
iw
,C^IO»
bL_
tUl£ |
£XW
hr
Now regardless of whether this is a uell-chouglt-out
way to divide up a subject— I'll be interested to see
how it works out— these controls do not seem to be well-
arranged for conceptual clarity. It seems to be the old
rowa-of-buttons approach.
I have no doubt that the people working on this sy¬
stem are certain this is the only possible layout. But
consider that the student's options might be clearer to
him, for instance, if we set it up as follows:
Gewftl't'eJ Aff
08
DM 50
Or Ilk* chi*:
Wh«t 1 am trying to show here ia that merely Che
arrangement of b uttons creates different fantic con¬
strue cT If you see this, you will recognize that
considering all the other options we have, designing
new media is no small matter. The control structures
merge mentally with the presentational structures.
The temptation to settle on short-sighted designs hav¬
ing shallow unity ia all too great.
FANTIC DESIGN
Fantic design is basically the planning and selec¬
tion of effects . (We could also call these "performance
values"— cf. "production values" in movies.)
Some of these intended effects are simply the com¬
munication of information or cognitive structure— "in¬
formation transfer," to use one of the more obtuse
phrases current. Other desirable effects Include orien¬
ting the user and often moving him emotionally, including
sometimes overwhelming or entrancing him.
In the design of fantic systems involving automatic
response, we have a vast choice among types of presenta¬
tional techniques, tricks that are just now becoming
understood. Not just screen techniques and functions,
but also response techniques and functions.
(If "feelie" systems are ever perfected, as in
Huxley's Brave New World, it's still the same In prin¬
ciple. See Wachspress, p. D*^.)
In both general areas, though-- within media, and
designing media-- it seems to me that the creation of
organizing constructs is the most profound problem.
In particular, the organizing constructs must not dis¬
tract, or tear up contents. An analogy: in writing, the
inventions of the paragraph, chapter and footnote were
inventions in writing technique that helped clarify what
was being expressed. Whet we need in computer-based
fantic design is inventions which do not artificially
chop up, constrain, or interfere with the subject (see
box, Procrustes, nearby).
I do not feel these principles are everywhere suf¬
ficiently appreciated. For instance, the built-in
structures of PLATO (see "Fantic Space of PLATO," p.
I*' 7.1) disturbs me somewhat in its arbitrariness— and
the way its control keys are scattered around.
Selection of point* and parts contribute* to both
•■pacts. If you are trying to keep the feeling of a
thing from being ponderous, you can never Include
everything you wanted, but must select from among the
explicit points and feeling-generators that you have
thought of.
2. The design of media themselves, or of media
subsystems, is not usually a matter of option. Book*,
movies, radio and TV are given. But on occasion, as
for world's fairs or very personal projects, we have
a certain option. Which allows things like:
Saellavlslon or whatever they called it:
movies with a smell-crack, which went out
Into the theater through odor generators.
Branching movies (see p.j>^iH^).
"Multi-media" (multiple audio tracks and si¬
multaneous slide projections on different
screens).
Stereo movies.
And so on. The thing about the ones mentioned ia that
they are not viable as continuing setups for repeated
productions. They do not offer a permanent wide market;
they are not stable; they do not catch on. Which is in
a way, of course, too bad.
But the great change is Just about now. Current
technicalities allow branching media — especially those
associated with computer screens. And it is up to us now
to design them.
3. MENTAL ENVIRONMENTS are working places for struc¬
tured activity. The same principles of showmanship apply
to a working environment as to both the contents of media
and the design of media. If media are environments into
which packaged materials are brought, structured environ¬
ments are basically environments where you use ncn- packag-
ed material, or create things yourself. They might also
be called "contentless media." The principles of whole¬
ness in structured environments are the same as for the
others, and many of our examples refer to them .
The branching computer screen, together with the
selfsame computer's ability to turn anything else on
and off as selected by the user, and to fetch up in¬
formation, yields a realm of option in the design of
media and environment that has never existed before.
Media we design for acreen-based computer syatems are
going to catch on widely, so we must be far more at¬
tentive to the options that exist in order to commit—
nationally, perhaps— to the best .
In tomorrow's systems, properly unified controls
can give us new flexibilities. If deeply well-designed,
these promise magnificent new capabilities. For in¬
stance, we could allow a musician to "conduct" the per¬
formance of his work by a computer-based music synthesis
system (see "Audio," p.>>*\il), perhaps controlling the
many qualities of the performance on a screen as he goes,
by means of such techniques as dimensional flip (see
P-ArtTl). (The tradition of cumulative audio synthesis,
as practiced in the fifties by Les Paul and Mary Ford,
and more recently by Walter Carlos and Mike Oldfield,
will take on a new fillip as multidimensional control
techniques become common.)
On* of the Intents of thl* book has been to orient
you to some of the possibilities snd some of the options,
considered generslly. There is not room, unfortunately,
to dlecusa more then one or two overall possibilities in
detail. The most successful such system so far has been
PLATO (discussed pp. DM18-19): other*
k,1 L LiPU f*r >*.«
V if* c*
NEW MEDIA TO LAST
What’s worse, we are confronted not merely with the
Job of using computers to present specific things. The
greater task ia to design overall computer media that
will last us into a more Intelligent future. Adrift in
a sea of ignorance and confusion, it is nevertheless our
duty to try to create a whole transportation system that
everybody can climb aboard. For the long run, fantic
syatems must be treated not as custom systems for explicit
purposes, but as OVERALL GENERAL DESIGNS WHICH WILL HAVE
TO TIE TOCETHER AND CATCH ON, otherwise collapse and
perish.
FINAL CONSEQUENCES.
It Beems to me certain that ve are moving toward
a generalized and universal Fantic system; people can
and should demand It. Perhaps there will be several;
but if so, being able to tie them together for smooth
transmission is essential. (Think of what it would be
like if there were two kinds of telephones?) This then
Is a great search and crusade: to put together truly
general media for^future, systems at which we can read,
write, learn and visualize, year after year after year .
The lnltlativea are not likely to come from the more
conventional computer people; some of them are part of
the problem. (Be prepared for every possible form of
aggressive defensiveness from programmers, especially:
"Why would you want that?" The correct answer is
BECAUSE, dammit!)
But this all means that interior computer technical¬
ities have to be SUBSERVIENT, and the programmers cannot
be allowed to dictate how it ia to behave on the basis
of the underlevel structures that are convenient to thoi.
Quite the contrary: from the fullest consideration of the
richest upper-level structures we want, we the users-to-
be must dictate what lower-level structures are to be
prepared within.
But this means you, dear reader, must develop the
fantic imagination. You must learn to visualize possible
uses of computer screens, so you can get on down to the
deeper level of how we are going to tie these things
together.
The designer of responding computer systems is
creating unified setups for viewing and manipulating
things— and the feelings, impressions and sense of things
that go with them. Our goal should be nothing less than
REPRESENTING THE TRUE CONTENT AND STRUCTURE OF HUMAN
THOUGHT. (Yes, Dream Machines indeed.) But it should
be something more: enabling the mind to weigh, puraue,
synthesize and evaluate ideas for a better tomorrow.
Or for any at all.
BIBLIOGRAPHY
But there is always something artificial— that is,
some form of artifice— in presentation. So the problem
is to devise techniques which have elucidating value but
do not cut connections or ties or other relationships
you want to save. (For this reason I suggest the reader
consider "Stretchtext," p. AM'®| , collateral linkage
(p- and the various hypergrams (p.1^).
These structures, while somewhat arbitrary and artifi¬
cial, nevertheless can be used to handle a subject
gently.)
An important kind of organizing construct is the
map or overall orienting diagram. This, too. Is often
partly "exact" and partly "artifice:" certain aspects of
the diagram may have unclear import but clear and help¬
ful connotation. (For instance, consider the "picture
systems" diagram on p. DM 2.0 — just what does the
vertical dimension mean? Yes, but what does it really
mean ?)
Responding systems now make it possible for such
orienting structures to be multidimensional and respon¬
ding (cf. the orienting function of the "dimensional
flip" control illustrated on p. DM JJ ).
Fantic design, then, is the creation either of
things to be shown (writing, movie-making, etc.) at the
lower end, or media to show things i£, or environments.
1. The design of things to be shown— whether
writing, movie-making, or whatever— is nearly always a
combination of some kind of explicit structure— an ex¬
planation or planned lesson, or plot of a novel— and
a feeling that the author can control in varying degrees.
The two are .deeply intertwined, however.
The author (designer, director, etc.) must think
carefully about how to give organization to what is
being presented. This, too, has both aspects, cognition
and feelings.
At the cognitive end, the author must concern him¬
self with detailed exposition or argument, or, in fiction,
Plot . But simply putting appropriate parts together is
not enough: the author must use organizing constructs to
continually orient the reader's (or viewer's) mind. Re¬
peated reference to main concepts, repeated shots (in a
movie) of particular locations, serve this function; but
each medium presents its own possible devices for this
purpose.
The organization of the feellops of the work
criss-crosses the cognitive; hut we can't get Into
it here.
6 L
Theodor H. Nelson, "A Conceptual Framework for
Man-Machine Everything." Proc. NCC 73.
-, "Computopia and Cybercrud." In Levien (ed.) f
Computers in Instruction . The Rand Corporation,
UOT- (Jv^ltrCf T®4.
Here’s hov: simple it is to create and edit text with the JOT system.
Since your typewriter is now a JOT machine, not every key does what it used to.
CREATING TEXT: just type it in.
The quick brown fox jumps over the lazy dog.
Jf The quick brown fox jumps over the lazy dog.
REVIEWING A SENTENCE YOU JUST TYPED: the back-arrow takes you back, the space bar steps you
' through
sp Sp sp sp
/yr<r. (bell) The quick brown fox
DELETIONS AND INSERTIONS: the RUBOUT key rejects words you don’t want. To insert , merely type.
yiu 4- sp sp RUBOUT lithe sp sp sp sp sp sp
V (bell) The quick /brown/ lithe fox jumps over the lazy dog.
REARRANGING TEXT: first we make three Cuts in the text, signalled by free-standing exclamation
points.
>*■' iytt sp ! sp ! sp 1 fox
If fytt The 1 quick l lithe ! fox
TO REARRANGE IT, YOU TYPE: LINE FEED key. This exchanges the two pieces between the cuts.
CHECK THE RESULTS:
*- sp sp sp sp
(hell) The lithe quick fox
DM SI
T* NRKHI«- Her®
ft if flrtt-HttY-oUj ct* leir^
firrs f* Uve t» A«» you » ur.'ftwp,
«f 1 U* re*l IH-kj.]
I Another application of tiv: present invention i* nl*o in the srtj
of pictorial display, but offer# a greet variety of potential user choice* in
. simple circumstance. I call this the "uulking net" system bccauoc control is
effected through a changing network of choice# which step, or "walk,"
around the eercen.
j The problem of intricate ccaputor graphics may be phrased as
I fniinuc: riven that a digital system can hold a wide variety of graphical
II Materials ready to present, how my the user moot simply and conveniently
choose then" Indeed, how my the user keep track of what is happening, where
Either of these alternatives my continue with ite ovr.
developments and animations under control of lte own shank.
Several features of this control application are of special
Interest. Coe is that the presentation may be continuous in all directions,
aiding in continuous user orientation. Another le that presentations are
reversible In various vuyo, an aid both in user orientation and self-study.
(Not only is a demonstration reversible within » given shank, but the user may
back the pip through an intersection Into the antecedent shank—
which reappears at the Juncture as the llghtpen backs up— and the user ruy
continue to reverse the presentation through that preceding shank, or to re-ont«
lentil mechanism I have selected for this facility paradoxJ the intersection and nuke another choice, "the path not taken.*) These
t eally combines great \
latillty for sophisticated presentations with great
simplicity before the naive user. The idea is this: the user my caround a
continuing accession of changing presentations, Biking only one simple choice
at a time, yet receiving Intricate and rich animations with extremely clear
I presentation on the screen
MM
of a forking set of arrows
la is this: along with an arbitrary graphic
p is continuously presented with the Image
The pip is a conventional ught-pen cursor. Tne "current shank" is a line
whose Implicit gradations control developrentc In the picture; and the choice
of arrows at tbo end of the current shank determine a discrete choice between
alternatives thut are to transpire.
The user, seizing the pip with the llghtpen, moves it (through
the usual llghtpen techniques) sideways along the current shank. Moving It In
the "forward" direction causes progressive developments In the picture, moving
It "backward" causes a reversal of animations and other previous developments.
j When the pip rcichsc the choice point in the forward direction,
the user may drag It (through the usual llghtpen techniques) along either of
the beckoning alternatives. This then causes further developments In the
presentation consonant with the line selected.
j "Developments” of the picture here Include expansion, contraction
sliding movements and frame-by-frame animation.
(These materials will have been, of course, explicitly input by
authors and artists.)
In a sample employment, consider a presentation on the subject
of Volcanoes. Let the first shank of the control net control the "rise of a
volcano fros the sea"— an undulating ocean surface pierced first by d wisp of
■aoke, then a growing peak, with rivulets of lava seen to run down its sides
and darken as they contribute to its growth.
dew ^ {,») jUl _
At the end of the first slunk, the user cay branth to two arrow:
labelled respectively WORD ORIGIR and BITERIOR. Either option continues the
presentation without a break, retaining much of the picture on the screen.
Selection of WORD OR IE JII caunes the word VOLCAKO to change to VULGAR, and a
picture of the god Vulcan Is seen to seize a lightning bolt rising from the
crater; text appears to explain this. Alternatively, if the user chooses
INTERIOR, the tubes and ducts within the volcano appear, and explanatory text
features allow the user clearly to repeat demonstrations as often aa he likes
and to explore numerous alternatives.
The displayed control net is thus to be understood as a large
network of choices, mostly unseen, whose c
:ntly visible portion "walks" aroun£
the screen as use progresses. Within this system, then, numerous variants are
possible. For Instance, the currently visible portion of the net may Itself
be whimsically incorporated in a picture, viz.:
CRpdlWSTeS THt 61 MT
The Greeks told of s giant*Procru*t*s (rhymes with
Rusty’s) who was very hospitable to passing travalers.
He would invite, indeed compel them, to sleep in his
bed. Unfortunately, because it was a vary odd bed, he
had to cut them up first...
Procrustes has haunted conversations ever since: and
any time we are forced to use categories that don’t pro¬
perly fit a subject, it seems like an invitation to the
Procrustean bed.
Hypertext systems at last offer total freedom from
arbitrary categorizing and chopping: but in some systems
for storing and presenting information, I can’t help hear¬
ing the whisk of Procrustes’ knife—
"Take new Tap-A-Toe Futuroidic Footless
De-Clutching. Instead of old-fashioned gas,
brake and clutch pedals that kept your feet
busier than a dance marathon, Tap-A-Toe
Futuroidic Footless De-Clutching offers the
convenience of Single Pedal Power Control--
combines all foot functions in one single
pedal!
"Think of it: one tap-- you go, moving
off faster than a harfly after Repeal.
"Two taps-- you change gears, as smooth
and automatic as a mortgage foreclosure.
"Three taps-- you stop quicker than the
U.S. economy.
"And that’s all there is to it. Tap-A-
Toe Futuroidic Footless De-Clutching with
Single Pedal Control is as easy and effort¬
less as the Jap march on Manchuria!"
Bruce McCall,
"1934 Bulgemobile Brochure,"
National Lampoon , May 74, 76-7.
STCU-WSIOM
system would allow you a "feelie" glove along
with your computer display— ths sort of thing
Mike Noll has been doing at Bell Labs.
Now, suppose you are pleying with a diagram
of a star on a computer display screan. It’s all
very well to see its layers, flowing arrows re¬
presenting convection currents, promontories end
so on— but soma things you ought to be able to
feel . For example, the mechanical resonance-prop¬
erties of stars. It would be nice to be able to
reach and grasp the star, to squeeze it and feel
its pulsations as it regains its shape. This
could be done in the glove— et the same time the
Image of the giova grasps the etar on the screen.
l Uvt c «J)sJ f
SHOtiMfKMirMOlKXSY?
iWTCUfCTRON'Cf? [s. <W]
THOO&HTOMMioH?
/^DOT THE
'FAN TICS.’
First of all, I fee] that very few
people understand what interactive computer
thinks°lt^# e
I think it's all show business
PENNY ARCADES are the model for interactive
computer systems, not classrooms or libraries
or imaginary robot playmates. And computer
graphics is an intricate branch of movie¬
making .
Okay, so I wanted a term that would
connote, in the most general sense, the show¬
manship of ideas and feelings-- whether or not
handled by machine.
I derive "fantics" from the Greek words
"phainein" (show) and its derivative "phantas-
tein" (present to the eye or mind).
fantastic . fantasy, phantom
what is~shown~ ; in medical i
to an opaque object drawn a
"phantom limb" is an ampute
that the severed limb has b
fantast is a dreamer.
1» phantom . ("Phantom" means
medical illustration it refer:
transparent; a
s temporary feeling
n restored.) And a
The word "fantics" would thus include
the showing of anything (and thus writing
and theater), which is more or less what I
intended. The term is also intended to
cover the tactics of conveying ideas and
impressions, especially with showmanship
and presentational techniques, organizing
constructs, and fundamental structures
underlying presentational systems.
Thus Engelbart's data hierarchy (P.^Ht-T)
SKETCHPAD’S Constraints (p.jM>), and PLATO’S
fantic spaces (p.^MK-^ are fantic constructions
that need to be understood if we are to under¬
stand these systems and their potential usages.
Livermore Labs, those hydrogen-bomb
design people, will have a "Laboratory for
Data Analysis," an opulent facility for ex¬
perimenting with multidimensional visualization.
One of your jolly Ironies. I have seen pic¬
tures of beautiful multibutton control handles which
were designed for project SMASH, would you believe
Southeast [Asia] Multisensory Armament System for
Helicopters. Aargh.)
The best with the worst.
rerything is deeply intartwingled.
Designing screen systems that focus
the user's thought on his work, with help¬
ful visualizations and no distractions, is
the great task of fantic design.
In a system I designed for CRT motion-
picture editing, the user could maipulate
written descriptions on the screen (corres¬
ponding to the usual yellow-pad notes). To
see the consequences of a particular splice,
for instance, the editor would only have to
draw a line between two annotated lines re¬
presenting shots. Trim variations could be
seen by moving this cut-line (illustrated).
Not long after, CBS and Memorex did in¬
troduce a system for movie-editing by CRT--
but I've heard that in their system the user
has to actually deal with numbers. If so,
this is missing the whole point.
/ HwW' IK Iko* F»«y
f KONSTtri AfPAOACRejV'
jgioscyr os HCxp:ijc
(The P>th unchosen fades from the i
i doea the previous
Of course, to build such a responding glove,
particularly one that gave you eubtle feelinge
beck in your fingere, would probably be very ex¬
pensive. But it’s the kind of poeeibility people
should start considering.
DM 5 Z
*THmKt£roys*
Ciur greatest prooiems involve thinking and the
visualization of complexity.
By "Thinkertoy" I mean, first o£ all, a system
to help people think. {'Toy' means it should be easy
and fun to UBe.) This is the same general idea for
which Engelbart, for instance, uses the term "aug¬
mentation of intellect."
But a Thinkertoy is something quite specific!
I define it as a computer display system that helps
you envision complex alternatives .
The process of envisioning complex alternatives
is by no means the only important form of human
thought; but it is essential to making decisions, de¬
signing, planning, writing, weighing alternate theor¬
ies, considering alternate forms of legislation, doing
scholarly research, and so on. It is also complicated
enough that, in solving it, we may solve simpler prob¬
lems as well.
Me will stress here some of the uses of these sy¬
stems for handling text , partly because I think these
are rather interesting, and partly because the com¬
plexity and subtlety of this problem has got to be
better understood: the written word is nothing less
than the tracks left by the mind, and so we are really
talking about screen systems for handling ideas, in
all their complexity.
Numerous types of complex things have to be inter-
compared, and their relations inter-comprehended. Here
are a few of the many types:
Successive drafts of the same document.
Pairs of things which have same parts the
same, some parts different <contracts, holy books,
statutes of different states, draft versions of
Under examination these different types of inter-
ccraparison seem to be rather different. Now, one ap¬
proach would be to create a different data structure
and viewing technique for each different type of complex.
There may be reasons for doing that in the future.
For the present, however, it makes sense to try to
find the most general possible viewing technique: one
that will allow complex intercomparisons of all the
types mentioned, and any others we might run across.
One such technique is what I now call collatera-
tion, or the linking of materials into collateral struc¬
tures, as will be explained. This is fairly straight¬
forward if you think enough about the problem; Engel¬
bart discovered it independently.
Let us call two structures collateral if there are
links between them, connecting a selected part of one
with a selected part of the other. The sequences of
the connected parts may be different. For simplicity’s
sake, suppose each one is a short piece of writing.
(We will also assume that there is some convenient form
of rapid viewing and following between one end of a link
and another.)
Now, it will be noted first off that this is an ex¬
tremely general method. By collateral structuring we
can easily handle the equivalents of: tables of contents;
indexes; comments and marginalia; explanations, exegesis,
explication; labeling; headings; footnotes; notes by the
writer to himself; comments and questions by the reader
for later reference; and additional details out of se¬
quence .
Collateration , then, is the creation of such
multiple and viewable links BETWEEN ANY TWO DATA
STRUCTURES, in principle. It is general and powerful
enough to handle a great variety of possible uses in
human intellectual endeavor, and deserves consider¬
able attention from researchers of every stripe.**
The problem then, is how to handle this for
rapid and convenient viewing and whatever other work
the user wants to do— writing and splicing, inter¬
comparing, annotating and so on. Two solutions ap¬
pear on this spread: The Parallel Textface^, design¬
ed as a seminal part of the Xanadu system (see
which I hope will be marketed with that system in the
near future, and a more recent design which I've work¬
ed on at the University of Illinois, the 3D Thinkertoy
or Th3.
CLARITY AND POWER
We stressed on the other side of the book that
computer systems must be clear, simple and easy to use.
Where things like business uses of computers are con¬
cerned, which are intrinsically so simple in principle,
some of the complications that people have been forced
to deal with in ill-designed computer systems verge on
the criminal. (But some computer people want others
to think that's the way it has to be. "Your first
duty is to keep your job, right?" one computer person
said to me recently. "It wouldn't do to set up systems
so easy to use that the company wouldn't need you any¬
more." See "Cybercrud," p.8.)
But if it is desirable that computer systems for
simple-minded purposes be easy to use, it is absolutely
necessary that computer systems for complicated purposes
be simple to use- If you ait wrangling over complex al¬
ternatives— say, in chess, or in a political simula¬
tion game (see "Simulation," p. %% ), or in the throes
of trying to write a novel, the last thing you will tole¬
rate is for your computer screen to introduce complica¬
tions of its own. If a system for thinking doesn't
make thinking simpler— allowing you to see farther and
more deeply— it is uselss, to use only the polite terra.
But systems can be both powerful and simple at
the same time. The myth that things have to be com¬
plicated to do anything for you is pernicious rubbish.
Well-designed systems can make our mental tasks lighter
and our achievements come faster.
It is for this reason that I contend A the reader
these two designs of mine: as examples of user-level
control and viewing designs— fantic environitents, if
you will (see p^Ki)— that are pruned and tuned to
give the user great control over the viewing and cross¬
consideration of intricate alternatives, without com¬
plication. I like to believe that both of these, in¬
deed, are ten-minute systems— that is, when we get
them running, the fange of uses shown here can be taught
to naive users, in ten minutes or less .
It is because of my heartfelt belief in this kind
of simplicity that I stress the creation of prefabrica¬
ted environments, carefully tuned for easy use, rather
than the creation of computer languages which must be
learnt by the user, as do such people as Engelbart (see
p.»>M&) *nd DeFanti (see p.^^O. Now, their approach
febvioualy has considerable merit for sophisticated users
who want to tinker repeatedly with variant approaches.
For people who want to work incessantly in an environ¬
ment, and oil other things— say writers— and are ab¬
sent-minded and clumsy and nervous and forgetful (like
the present author), then the safe, prefabricated en¬
vironment, with thoroughly fail-safe functions and ut¬
terly memorable structural and control interrelation¬
ships, is the only approach.
* In my 1965 paper (see bibliography) I called collateral
structures zlppered lists .
A group at Brown University has reportedly worked
along these lines since I worked with them, but due
to certain personal animosities I have not kept up
with their developments. It will be interesting to
see what kind of response they can get out of the
IBM systems they are using.
BIBLIOGRAPHY
Theodor H. Nelson, "A File Structure for the complex,
the Changing and the Indeterminate." Proc. ACM 65.
84-100.
-, "Simplicity Versus Power In User Systems."
Unpublished.
DECISIOn/CREATIVITY SYSTEMS
Theodor H. Nelson
19 July 1970
WE OFTEN WANT TO SAVE ALTERNATIVES.
And {lastly it my [biarl] tie frttdd,
Ami stilt mUl « m t
[JmJ 4iiV mi with bir swimming ryts ]
Tbtt / [attld ] rttbtr fit! tbtn it
[Her grntft Bntm riu ,—]
[ And wrts sfrm, strttt (y tbtirt,'] j c^w, krWii a *• mol
[W/] /• U brr Inst with mtidrt fridt i
And n / wit my Gtttvmt,
My [irigbi] 6- Jtvt/y ■Bridt.'}
From Coleridge's Poems: A Facsimile
Reproduction of the Proofs
and MSS, of some of Che Poems .
(Folcroft, 1972.)
It has been recognized from the dawn of computer display that the
grandest and most important use of the computer display should be to
aid decisions and creative thought. The work of Ivan Sutherland (SKETCHPAD)
and Douglas Engelbart have really shown how we may use the display to
visualize and effect our creative decisions sviftly and vividly.
For some reason, however, the most important aspect of such systems
has been neglected. We do not make important decisions, we should not
make delicate decisions, serially and irreversibly. Rather, the power of
the computer display (and its computing and filing support) must be so
crafted that we may develop alternatives, spin out their complications
and interrelationships, and visualize these upon a screen.
No system could do this for us automatically. What design and
programming can create, however, is a facility that will allow us
to list, sketch, link and annotete the complexities we seek to under¬
stand, then present "views" of the complexities in many different forms.
Studying these views, annotating and refining, we can reach the final
designs and decisions with much more in mind than we could otherwise
hold together in the imagination.
Some of the facilities that such systems must have include the
following:
Annotations to anything, to any remove.
Alternatives of decision, design, writing, theory.
Unlinked or irrerrular pieces . hanging as the user wishes.
Multicoupling , or complex linkage, between alternatives, annota¬
tions or whatever.
Historical filing of the user's actions, including each addition
and modification, and possibly the viewing actions that preceded them.
Frozen moments and versions , which the user may hold as memorable
for his thinking.
Evolutionary coupling , where the correspondences between evolving
versions arc automatically maintained, and their differences or relations
easily annotated.
In addition, designs for screen "views", the motion, appearance
and disappearance of elements, require considerable thought and imagi¬
nation.
The object is not to burden the user, or make him aware of complex¬
ities in which he has no interest. But almost everyone in intellectual
and decision pursuits has at some time an implicit need for some of
these facilities. If people knew they were possible, they would demand
them. It is time for their creation.
A full-fledged decision/creativity system, embracing both text and
graphics, is one of the ultimate design goals of Project XANADU.
We might also think of them as systems for
OF UX& e*y>s.
DM 53
This user-level system is intended to aid in
all forms of writing and scholarship, as well as
anywhere else that we need to understand and mani¬
pulate complex clusterings of text (i.e., thought ).
It will also work with certain animated graphics.
The Parallel Textface, as described here,
furnished the initial impetus for the development
of the Xanadu tm system (see p.^lSSfe). Xanadu was
developed, indeed, originally for the purpose of
implementing some of these functions, but the two
split apart. It turned out that the Parallel
Textface required an extremely unusual data struc-
structure and program techniques; these then became
the Xanadu system. As developed in the final
Xanadu design, they turn out to handle some very
unusual kinds of screen animation and file retrieval.
But this grew out of structuring a system to handle
the functions described here.
Thus the Parallel Textface basically requires
a Xanadu system.
It is hoped that this system can be sold com¬
plete (including minicomputer or microprocessor--
no connection to a large computer is required) for
a few thousand' dollars by 1976 or 1977. See p.
(Since "business people" are extremely skeptical
as to whether anybody would want such a thing, I
would be interested in hearing expressions of in¬
terest, if any.)
<£>W72~ T t * aioN
As shown here, the screen presents two panels
of text; more are allowed. Each contains a seg-
ment of a longer document. ("Page" would be an im-
proper term, since the boundary of the text viewed
may be changed instantly.)
The other odds and ends on the screen are hid¬
den keys to control elements which have been made
distraction tHl5 lllustration )• J ust t0 lessen the
Panel boundaries and control graphics may b->
made to appear by touching them w.lU Ut lijktpe*.
fe;T
iT:
T. WtLSori
ROVING FUNCTIONS
x , i The te * t raoves on the screen! (Essential 1
contain^ 1 " ' X ? ht han ? corner each text panel *
S inconspicuous control diagram. The
tjorizontai extension is a movable control
oin\m T !i e A SeT> W MM h B hlS light pen, may move the
doWn ^ , U P" causes the text to move
smoothly upward (forward in the material), at a
rate proportional to how far you push the pip-
no? ^ aU ^ eS 14 m ? ve back * ( Note that we do
here t0 line -b/-line jumps, but
a h ! Creen motlon » "hich is essential in
a high-perfor^nce system. If the text does not
move, you can't tell where it came from.)
PARALLEL TEXTFACE (1971)
Real person sits at
cardboard Xanadu mockup.
fwf Wt
DERIVATIVE MOTION: when links run sequential¬
ly, connecting one-after-the-other on both sides,
the contents of the second panel are pulled along
directly: the smooth motion in one panel is match¬
ed in. the other. This may be called derivative
motion , between independent text (being handled
directly with the lightpen) and dependent text
(being pulled along). The relationship may be re¬
versed immediately, however, simply by moving the
lightpen to the control pip of the other panel,
whose contents then become the independent text.
Irregularities in the links will cause the
independent text to move at varying speeds or jump,
according to an average of the links' connectivity.
"Nice keyboard. But
what happened to
your typewriter?"
Two panels are about
right for a 10 x 10
screen.
Independent text pulls
dependent text along.
Painted streaks simulate
motion, not icicles.
— I 4*t**V*'t
(5 r\7t T.nttjsH
If no links are shown, the dependent text just
stops.
©nil
Collateral links between material! in the
two panels are displayed as movable lines bet¬
ween the panels. (Text omitted in this diagram;
panel boundary has been made to appear.)
Some links may not have both their endpoints
displayed at once. In this case we show the in¬
complete link as a broken arrow, pointing in the
direction of the link's completion.
The broken arrow serves not merely as a vi¬
sual pointer, but as a jump-marker leading to the
linked material. By zapping the broken arrow with
the lightpen, the user summons the linked material--
as shown by the completion of the link to the other
panel. (Since there has been a jump in the second
panel, we see that in this case the other link has
been broken.)
© 1172- T.UttSoH
When such links lead to different places, both
of these destinations may nevertheless be seen at
once. This is done by pointing at both broken links
in succession; the system then allows both links to
be completed, breaking the second panel between the
two destinations (as shown by dotted line across
panel).
9 L
DM S«
xm
©im T.ticuori
FAIL-SAFE AND HISTORICAL FEATURES.
In systems for naive users, it is essential
to safeguard the user from his own mistakes. Thus
in text systems, commands given in error must be
reversible. For instance, Carmody's system (see
p. DM 1 ) ^) requires confirmation of deletions.
Another highly desirable feature would allow
the user to view previous versions, to see them col¬
laterally with the corresponding parts of current
versions, and even go hack to the way particular
things were and resume work from the previous
version.
In the Parallel Textface this is all com¬
prised in the same extremely simple facility. (Ex¬
tremely simple from the user's point of view, that
is. Inside it is, of course, hairy.)
In an egregious touch of narcissistic humor,
we use the very trademark on the screen as a control
device (expanded from the "X" shown in the first
panel 1
T-
Actually the X in "Xanadu 1 ®," as it appears
on the screen, is an hourglass, with a softly fall¬
ing trickle of animated dots in the lower half, and
Sands of Time seen as heaps above and below. These
have a control, as well as a representative, func¬
tion.
TO UNDO SOMETHING, YOU MERELY STEP "BACKWARD
IN TIME" by dagging the upper part of the hourglass
with the lightpen. One poke, one editing operation
undone. Two pokes, two operations.
You may then continue to view and make changes
as if the last two operations had never taken place.
This effectively creates an alternative time-line.*
However, if you decide that a previously undone edit
operation“should be kept after all, you may step
forward -- stepping onto the previous time-line--
oy using the lower half of the hourglass.
Ccmisiok Tre^
©1171 V-
_ D f ee *; his clarified in a master time diagram
nIv^r V « S1 ^ n k Tree ? hlC £ may be summoned to the screen,
ve^sion^r! 0 ?;-! exa ! n P le ** see that three
and Still "current," various other starts
and variations having been abandoned. (The sha B Ey
fronds correspond to short-lived variations, reiSlt-
operations which were then reversed. In
teri-Sj*footS{;!) to use Gerald's
©'174, r.«cut»«
V
~ y
xt) ^7
' ' 0^,.* afiftKj +. L,»k
... and see them displayed collaterally; and revise
them further.
Separate portions of the Edit Rose invoke
various edit operations. (You must also point with
the lightpen to the necessary points in the text:
once for insert, twice for Delete, three or four
times for Rearrange, three times for Co*w 1
GETTING AROUND
The user may have a number of standby layouts,
with different numbers of panels, and jump among
them by stabs of the lightpen.
Importantly, the panels of each can be full ,
each having whatever tne~ contents were when you last
left it.
-- - - ->£ —M—r-
©K72- r.*JCCJc«
The File Web tm is a map indicating what
(labelled) files are present in the system, and
which are collaterated.
The File Star tm is a quick index into the con¬
tents of a file. It expands as long as you hold
the lightpen to the dot in the center, with various
levels of headings appearing as it expands. Natur¬
ally, you may jump to what you point at.
©Mil. T-HiLfrm
for organizing by multiple outlines or tables
of contents;
©l^7l T. NJUpM
and as a Thinkertoy, organizing complex alternatives.
(The labels say: "Conflicting versions," "New account
of conflicts," "Exposition of how different accounts
deal with objections," "Improved, synthesizing account,
In other words, in this approach we annotate and
label discrepancies, and verbally comment on differen¬
ces in separate files or documents.
In ways this may seem somewhat obtuse. Yet above
all i_t is orderly , and the complex of collateral files
has a clarity that could be all-too-easily lost in sy¬
stems which were programmed more specifically to each
problem. *<*/.*.'
<€)i172. r-mw-ntf
The user-- let’s say he is a thoughtful writer--
may define various Versions or Drafts, here marked
on the Revision Tree.
©\ri2. T-UccyoU
He may, indeed, define <
different versions defined ai
Tree...
>1 lateral linkages between
various Times in the
©1174 T KiUoti
EDITING
Rather than giving the user anything complicat¬
ed to learn, the system is completely’ visual. All
edit controls are comprised in this diagram, the Edit
Rose tm . Viz..:
S L
The fundamental strength of collateration,
seen here, is of course that any new structure
collateral to another may be used as a table of
contents or an outline, taking the user instantly
to parts which are of interest in some new context.
* Oddly, this has the same logical structure as
time-travel in science-fiction.
There are basically three alternate premises of
of time-travel: 1) that the past cannot be changed,
all events having preceded the backstep; 2) that the
past can be changed; and 3) that while time-travelers
may be deluded into thinking (2), that (1) is really
the case-- leading to various appointment-in-Samarra
plots.
Only possibility (2) is of interest here, but
there are various alternative logics of mutability and
time-line stepping. One of the best I have seen is in
The Man Who Folded Himself by David Gerrold (Popular
riFrary ,n?73) : logic expounded pp. 64-8. I am be¬
mused by the parallel between Gerrold's time-controls
and these, worked out independently.
DM 55
h 1UY W
TCXT SfUtM.
RteA IV't at 'i® or J« r, l-
MW.***/.—I
This design, TK3 (Thinkertoy In
3 dimensions), Is one I have been work¬
ing at while on the faculty of the Univ¬
ersity of Illinois. It la designed spe¬
cifically for implementation using De-
Fanti's CRASS language (see p.J>"V3)),
and the Vector Ceneral 3D display (aee
p.*^D). Whether It will ever be actually
programmed depends, of course, on numer¬
ous factors.
It la meant to be a very hlgh -
power thinkertoy, suitable for experimen¬
tation with creative processes, especially
writing and three-dimensional dealgn.
(There is no room to discuss the latter
here.) It Is suited tepeeially to the visual¬
ization of tentative structures In amorphous
clusters. In some of its features It goes
considerably beyond the more "coraoercial"
thinkertoy system, the Parallel Textface
(elsewhere in this spread).
Nevertheless, the same design criteria
apply: a well-designed computer environment
for any purpose should be learnable In ten
minutes ; otherwise the designer has not been
doing his job. (I mean It would be learnable
in ten minutes If you and I had It in front
of us, working. This description will have
to be weird and abstruse, I'm sorry to say.)
This system is designed around a three-
dimensional display screen (the Vector Gener¬
al display, as manlpulable by thq^RASS lan¬
guage).
The crucial point here ia that it'a unified
tn the user: every version appears on a side of
a box; and a typeset version Is simply a magni¬
fied two-dimensional view in which the two dimen¬
sions are "position in overall text" (vertical)
and "position on line" (horizontal).
Each aide of a box may have a different
view projected to it. This means that as many
aa three views of a specific clutter may be
seen at once. However, for consistency these
muat have appropriately^coenon dimensions.
By rotation and zooming the user may focus
on the original pieces, and work with them, writ¬
ing and revising.
Moreover, by using a combination of zoom
and hardware clipping (aa available on this
equipment), the user may restrict his work to
a specific range of material on particular di¬
mensions.
GALAXY AND BOX
There are basically two views of what
you are working with: the Galaxy and the Box.
They appear in various manifestations, allow¬
ing you to study discrete relations and struc¬
tures In the material; various "dimensions" of
the material; alternate versions and drafts to
be made from the material; and the complex col-
lateration (see under "Thinkertoys") of differ¬
ent structures.
Now, most people do not think of text
as three-dimensional. Laymen think of it as
two-dimensional, since it's usually printed
on rectangular pages. Computer people or¬
dinarily think of it as one-dimensional, as
a long string of characters and spaces—
essentially what you'd get If you printed
things In one line on a long, long ribbon.
Well, frankly, I don't think of text as
three-dimensional either; but like anything
else, it has numerous qualities or dimen¬
sions, any three of which it's nice to be
able to view at once (see "Dimensional Flip,")
And that's essentially the idea:
the three dimensions we'll look at at any
one time will be a particular view of a larger
whole.
Now, the basic torm of storage will be
one of those Nelson-structures that drives
computer people batty. Specifically, the
basic data structure will be clusters of
In what follows we will discuss the screen
functions but not the control structures, which
have not firmed up particularly.
1. GALAXY VIEWS.
The points are seen as a cloud of dots on
the screen. If no view coordinates are supplied,
the dots will be randomly positioned.
A. "Star Trek" effect.
Under a user's zoom control, the dots
fly apart as if he is hurtling through
space.
B. MAGNIFICATION. The user may "magnify"
the dots, making each show its keywords
further text, and on up to the full
Piece.
C. ROTATION. The 3D structure of the dots
in space may be seen by the user at
any time through short rotations ■
Puns sometimes reflect a higher reality.
Now It turn6 out that this structure in fact
reflects a great Folk Truth: written discourse
does in fact consist of "points" which you
Intend to get across . That we here intend to
have them rotate as dots upon a screen reflects
this structure.
Writing is, in fact, a projection from
the Intended "points" to a finished exposition
which embraces them. Now, this is very like
the view of language held in modern linguistics,
namely, that a finished sentence is a "surface
structure" constructed out of basic sentence
kernels chewed up by certain transfonnatlons .
Well, I am just pointing ouc here that writing
is a surface structure of "points" which have
been embedded and spliced in a structure of
transitions, accordance-notes and so forth (see
The general idea of the Th3 system, then,
is that the user may view the "points" he
wishes to make, variously upon the 3D viewing
surface. Successive drafts, then, will all be
projections , geometrically, from this interior
structure of points.
Finally, the unifying idea that gives the
system simplicity is this: all views will be on
faces of a cube.
(FURTHER TECHNICALITIES OF THESE 'POINTS':
Each point may have a value (numerical pa¬
rameter) in any of a number of dimensions
(which number may itself change). Such
values may be null , as distinct from zero,
showing that the point has no position on
that particular scale.
Associated with each point may be one
or more pieces and scraps or written mater¬
ial. Such scraps may be just phrases or
single words. (Indeed, such scraps may be
associated not Just with a point, but with
several apeclflc values of a point.) Each
scrap may also contain keywords .
Discrete relations between points may
also be defined. There may be a variety
of typeB of relation, which either exist
between two points of don't.)
0. Any relations that exist among the
Points, Insofar as they have been logg¬
ed into the system, may be displayed
E. The user may sort the points by moving
them with a llghtpen.
F. The user may write within the individ¬
ual pieces and splice them together,
combining llghtpen and keyboard oper¬
ations.
2. BOX VIEWS
In the Galaxy Views, the individual Points
simply swarm about with no definable position.
'Box Views" allow you to order the points on any
dimensions that have meaning to you, in an ar¬
bitrary coordinate-space.
The box is more than a mere measurement 1
frame. On request the user may see the points
projected on a specific face of the box (ortho-
graphically); and on request he may also see pro¬
jection lines between a box-face and its cor¬
responding point in the point cluster.
"Magnifying^' as before, will create a view
of the text: but in the box mode of viewing, the
text appears on the aide of the box . That is,
the inner view will project to the outside,
yielding a draft . Naturally, this is the current
assembly of your pieces; If certain coordinates
are selected it is even a "typeset" version.
(Note: Vector General hardware does not al¬
low character rotation; only keyword and headline
rotation is possible, through software character
generation. Thus text pieces on the side of a
box show certain freaky movements if the side is
not viewed square-on.)
^ At the 1971 Spring Joint Computer Conference, I think it was,
I was heckled by a linguist who accused me of being "unimaginative,"
Insisting, further that writing is merely an extension of speech
and thus merely" the application of further transformations; and
he claimed further that what the user therefore needs is an input
language to specify these transformations. This view, while inter¬
esting, is wrong.
A but/indeed control language might be interesting, however.
[Appended by the
however-operation, a postfix "but." See "Writing,’' p. DM^.]
. " \
\l
•to,
COLLATERAL CALAX1ES AND BOXES.
Viewing of collateral structures works
through the same mechanism. Galaxies and
boxes may be collatereted:
COMPLICATED NOTE: The extenalon of these
mechanisms to pictorial graphics in two
and three dimensions is straightforward,
and to conceptual substructures (such as
may exist) behind these graphics. The
same goes for collateratlon and annotation •
of multidimensional cluster materials, e.g.
in sociology: the system would allow, for
Instance, the viewing, annotation and col-
lateration of sociometric clusterings.)
BOX FISSION. (The Beauty Part.)
For paired views of projections from
the same cluster which do not share a com¬
mon coordinate, a marvelous trick Is pos¬
sible: BOX FISSION. Starting with one box
containing a galaxy, we pull It apart .
making two boxes and two galaxies whose
Points are linked.
Now both boxes can be rotated Indepen¬
dently, and any view considered; equivaience-
linkages may now be viewed between any two
views. (The eye muat, however, turn two
corners.)
(It is interesting to note i_mat the links in
Box Fission are handled automatically, to an
extent, by the hardware.)
WELCOME TO THE FUTURE. HUH?
This has summarized the development of
some Ideas for the viewing and manipulation
of complex stuff. 1 offer this design. Inso¬
far as I have been able to present it h^e,
as an example of fantic design (see p. 5‘0 ) •
There iB.no logical necessity to it; it cor¬
responds to the traditional structure of no
technical system; it arises from no intrinsic
or traditional data structures used for com¬
puter representation of these things.
But none of these considerations is to
the point. This design has a certain stark
logical simplicity; it extends Itself plaus¬
ibly from its basic outlook (or starting
ideas, if you can Isolate them) into a tool
for truly intricate cross-consideration,
without adding unnecessary and hard-to- ^
remember "technicalities." At least that s
how I think of it.
Obviously the aesthetics of it are im¬
portant to the designer. But a more final
criterion of its goodness— its usefulness-
may depend on the seme parsimony snd organi¬
zational clarity.
XAHANT
2$*** ~.D oe )
KUBLA KHAN : OR. A VISION IN A DREAM.
A VHAdWKNT.
or tW, the Author, (hen It
d t.l n I oo. oo t?
iTih*'!. from ih _
•trl tllAl lie IU rMdiDK
m “ t*urchM»'ii
'■It palace lo be
■ mflu of fertile
i for About three
■« blmuthtore. with
companion in eiilch All (hr imitr> roer up
A parallel production of the rorrcepohdent erpreeelon*. without any
■enulkxi or conedoiienee* of effort On awaking he Appeared lo hlnuelr
here a dlMInct recollection of the «hole. And taking hit pen, Ink. And
paper, inataatlyend eagerly wrote down the line* that »re here pre-
•erred. At tliia moment he waa unfurtuoately called out by a pereon
on bueineee from Porlock, And detained by him alaore an hour, and oo
his return to tlie room, found, to bis no email lurprteeand mortification,
dial (hough He (till retained entne rague and dim recollection of the
general purport of the etaioo, yet. with the reception of wme eight or
ten ecalteml line* and images, all (he rest had panort sway Ilka the
image* on the turface of a etream into which a etooe had been call,
but alaa ' without the after reiteration of the latter :
Then all the charm
I* broken—all that phantom-world »o fair,
iiid a t hoi Hand drcleU ipread.
KUBLA KHAN.
Ix Xanadu did Kubla Khan
A a lately pleasure-dome decree :
Where Alpb, the tarred river, ran
Through caverns measureless toman
Down to a sunless sett.
So twice five miles of fertile ground
With walls and towers were girdled round :
And there were gardens bright with sinuous rilla
Wlicrc blossomed many an incenw-benring tree :
And here were forests undent ns the hills,
Enfolding sunny spots of greenery.
But oh ! that deep romantic cliaai'u which slanted
Down the green hill athwart a erdarn cover I
A savage place ! as holy and enchanted
As e'er beneath a waning moon was Imunted
By woman wailing for her demon-lover !
And from this chasm, witli ceaseless turmoil seething.
As If this earth lo fast thick p ants were breathing,
A mighty fountain momently was forced :
Amid whose swift half-in term it tied burst
Huge fragments vaulted like rebounding hail,
Or chaffy grain beneath the thresher's flail :
And 'mid these dnneing rocks at once and ever
It flung up momently the sacred river.
Five miles meandering with a mazy motion
Through wood and dale the sacred fiver ran,
Then readied the caverns measureless to man,
And sank in tumult to a lifeless ocean :
And mid tills tumult Kubla heard from far
Ancestral voices prophesying war !
The shadow of the dome of pleasure
Floated mid way on the waves ;
Where waa heard the mingled measure
From the fountain and the caves.
It was a miracle of rare device,
A sunny pleasure-dome with caves of ice 1
A oainsel with a dulcimer
In a vision ouce I saw :
It was an Abyssinian maid,
And on her dulcimer Bhe played,
Singing of Mount Abora.
Could 1 revive wit bin me
Her symphony and song.
To such a deep delight r twould win me
That with music loud and long,
I would build that dome in air,
That sunny dome ! those caves of ice !
And all who heard should see them there.
And all should cry. Beware ! Beware !
His flashing eyes, his floaliug hair I
Weave a circle round him thrice,
And close your eyes with holy dread.
For be on bouey-dew hath fed.
And drunk the milk of Paradise.
"Is that the river that runs down to the sea?"
James Steuart
in
"The FBI Story."
Patent work on Xanadu is in progress.
Xanadu, friend, is dream.
The name comes from the poem (nearby);
Coleridge's little story of the artistic trance
(and the Person from Porlock) make it an appro¬
priate name for the Pleasure Dome of the crea¬
tive writer. The Citizen Kane connotations,
and any other connotations you may find in the
poem, are side benefits.
I have been working on Xanadu, under this
and other names, for fourteen years now.
Originally it was going to be a super sys¬
tem for handling text by computer (see p. \'X
and |-5 ). But it grew: as I realized, level
by level, how deep the problem was.
And the concept of what it was to be kept
changing, as I saw more and more clearly that
it had to be on a minicomputer for the home.
(You can have one in your office too, if you
want, but that's not what it's about.)
Now the idea is this:
To give you a screen in your home from
which you can see into the world's hypertext
libraries.
(The fact that the world doesn't have
any hypertext libraries-- yet-- is a minor
point.)
To give you a screen system that will
offer high-performance computer graphics and
’text services at a price anyone can afford.
To allow you to send and receive written mes¬
sages at the Engelbart level (see p .b\'\ L lfa) . To
allow you to explore diagrams (see p. 0MI7and
P. Dll-51 ) . To eliminate the absurd distinction
between "teacher" and "pupil."
To make you a part of a new electronic
literature and art, where you can get all your
questions answered and nobody will put you
down.
* * *
Originally Xanadu was programmed around
the Parallel Textface (see p. W153)• But as
the requirements of the Parallel Textface were
better and better understood, Xanadu became
a more general underlying system for all forms
of interactive graphic environments. Its data
structure has Virtual Blocklessness and is
thus well related to the smooth motions needed
by screen users. Thus in its final form, now
being debugged, it will support not only the
Parallel Textface (see p. )> the Walking Net
(see p.DHSI ), Stretchtext (see p.[)Ml9), Zoom
Maps (see p. DM 19) and so on, but indeed any
data structure that needs to combine complex
linkages with fast access and rapid changes.
Because the data structure is recursively
extensible, it will permit hypertext (see p. Drill)
of any depth and complexity, and the collateral
linkage (see p-bM*^) of an Y objects of contemp¬
lation.
Xanadu is under private development and
should be avail'able, if the economy holds, in
1976. Regrettably, first prices will not be at
the $3000 level necessary for the true Home
System. Exact equipment for the production ver¬
sion has not been selected. A number of micro¬
processors (see p. M H ) are i n serious conten¬
tion, notably the Lockheed SUE, but there’s
something to be said for a regular mini. The
PDP-11 is of interest (see p.^H2 ); (so espe¬
cially is its Cal Data lookalike-- unless DEC
would like to build us a PDP-11X with seven modes
of indirect display addressing. Are you reading
this, Ken Olsen?) And here's a laugh: a com¬
pany called IBM may in fact make a suitable com¬
puter, except that they call it the "3740 Work
Station." So for those customers who want IBM
equipment, maintenance and prices, with Xanadu
software, it's a definite possibility.
So, fans, that about wraps it up. I * 11 be
interested in hearing from people who want this
system; many hardheaded business people Tiave
told me nobody will. Prove 'em wrong, America!
Of course, if hyper-media aren't the great¬
est thing since the printing press, this whole
project falls flat on its face. But it is hard
for me to conceive that they will not be.
WHAT IT IS: rha haar* ol the Xanadu ays tee, no*
bain? debugged, con.l.t. of a highly lrtagr.tad
tor usa on elnlcrwputsra ("softwya’—
aaa p. 16) or Microprocessors CMra««ra'— aaa
p. 44 ) . It la an operating aystaa with two pro-
r ». a highly ganarallrad data aanagaawnt aya-
taa for handling aatraawly cca*.ld« data in huge
lilii, and a ganarallrad dlaplay ayataa, married
to tha Othar, for handling branching animation
and retrieval and cannad dlaplay prograna. These
ordain retrievals by tha data system. Tha Paral-
lal Tvaatfaoa (aaa p. IRCJ) and tha Walking Wat
(aaa p.^tTI I ara two audi cannad programs.
Thaaa internal systems ara lrt>ndad to ba add
with conaolaa of various typaa. aa llluatratad
nearby, for etand-alon# turnkey usa (aaa p. 13 ).
xanadu la asIf-networklog. two on tha phona make
a natwork, and more can join.
LANCUJKStSi Xanadu programs will not ba made avail¬
able In any higher language!, mainly bacauaa of thalr
proprietary character, but alao bacauaa tha dlaplay
routinae (and some of tha retrieval routlnaa) milt
ba programmed in machine language.
Tha ayatam haa lta own under-level language, XAP
(Xanadu kaeambly Program). While two higher-level
dlaplay languagaa, DIWOO (Dlaplay Lingo) and X ult
(tha ultimata?) ara conts^>leted, thaaa will not or¬
dinarily ba accaaaibla to tha uaar. Tha purpoaa of
Xanadu la to furuieh tha uaar with uneomputerlah
good-guy eyitM for a pacific purpoeee, not a chance
to do hie own programing.
lagnrtant faaturaa of tha data ayatam ara huge ed-
draaaebillty (In tha trllllona of elemental »nd Vir¬
tual Blocfcleeeneee. For advantagaa of thla latter,
aaa Zocm Nap, p. ONIV
COMPATIBILITYi bacauaa of lta highly empactad and
unconventional etructure, it la not ct^>atibla with
othar operating ayatam (including time-eharing).
Anyway, to put it on a larger machine la like hav¬
ing your Hilda driven around in a truck. Bacauaa
it uaaa a line-drawing dlaplay (aaa p. Mtl-J) and
therefore drava Individual arbitrary linaa on tha
acraan repeatedly, it is not compatible with tele-
vlaiom either— unleee you point a TV camera at it,
or tha equivalent. Sorry.
STAKDAKDIZATIOat. Taking a laaaon from tha integrated
work of varioua people whoee work haa bean deacrlbed
in this book, wa aaa that if you want a thing dona
right , you have to do It youreelf. (Great Idaaa of
Waatam Man: one of a ear lea.) My good friend Calvin
Nooara with hie TRAC Language (aaa pp. 18-21) haa dit-
coverad that trademark la one way to nail thla aa a
right.
Several lavele of standardization ara important with
Xanadu. One, all Xanadu systeau muat ba able to work
with all Xanadu filae (except for poaaible varlatlona
In acraan performance and alia of local memory). Now,
there ara thoee who would not be concerned for thla
eort of univeraallty, and who might even try to maka
aura ayatama ware incompatible, lo that you had to buy
accaaaorlaa and converaion kite up and down tha line.
That ia one of tha thlnge that must ba avoided) ’par¬
tial' ct^atihlllty. aubjact to expanaiva optiona and
condition*, a wall-known technique in tha field.
By atabiliring the ’Xanadu’ trademark, I hope to pre¬
vent auch abananigana. Thua every accredited Xanadu
ayatam will offer full compatibility with tha data
etructure. and either full performance or aubatitutea
aa neccsaitatad by tha hardware. The ’Xanadu’ trademark
can thua in principle be made available to amnufacturars
abiding by all dasign faaturaa of tha eyatem.
Second, all Xanadu ayatama ehould ba able to work with
outelde ayaterna either through or off tha net, l_f they
conform to tha unuaual data rulaa required by tha un¬
usual daaign of tha ayatam. Thla aaaures that Xanadu
ayatama will ba compatible with any othar popular net¬
works. It almo aasurea others who want to offer Xan-
adu-class services to system owners (through, e.g.,
conventional time-sharing) that If they adhere to the
rules (aaa ’Canons." p.»*l5t> they can play the game
on a certified basis.
AVAILABILITY. It i* hoped that Xanadu will ba avail¬
able in 1975 for at least one machine (guess which).
Aa a program it will ba available only in absolute
form, without source or comaenta.
AHEM. There is a lot to talk about, but a lot of time
can ba wasted talking. It is suggested that thought¬
ful computer firms, interested in some form of partici¬
pation, study this book carefully— at least enough so
no one’s time need ba wasted.
B1BLI0CRAFHY
’’Nelson's the lame, and Uhat Ha Proposes Could Outdo
Enjalbart." Electronics. . 2* Hov 69, 97.
A recant report by Arthur D. Little, a Boeton firm
that makes its money by seeming to be omniscient,
commented on the considerable market potential
for on-line data supply ayateaa. The report
coat 5*00 or 5*000, I forget which. Big-time in-
First of all, bear In mind that Xanadu is a
iMlfied ayatam tor complex data management and
dlaplay. Thla basically means that tha imi ay¬
atam (without tha displays) can eerva aa a (aader
machine for tha data network Itself,
call, and atorlng any materials they want saved.
Thla saves all kiwi, of haaala. with big computer,
and bli-eomputer-etyle programing.
But who will pay for it? To build tha kind
o capacity wa’r. talking about- all tboa. dl.ka,
all those minicomputer. In a natwork— won't it
taka lmanaa amount, of capital? Now, paopl. ask
me, will any Ammrlcao company aver back auch a
Utopian schema?
One method of financing haa proven Itself la
tha postwar suburban era, thla time of drlva-ine
and hamburger stands.
Waal from (Tie a nook balcony of a largo Xanadu installation,
overlooking tha Internal greenery. Hexagonal architecture
permits physical expansion uithout interruption of eervioes.
(The nollusks have been telling us something about expansion.)
Franchising.
Vhat I propose, then, la tha Mom-end Pop Xanadu
Shop. Or, more proparly, tha Xanadu stand . ”)tom and
Pop” are tha owners of tha individual stand. But tha
customara can ba famlllca, too.
Porta-Xan. (Hookup by Tom Barnard.)
Faceplate reflects CUT to user vhile
he's abroad in the u orld. One-hand
typewriting and pointing device frees
the other. Can be built idth avail¬
able ruggedised components.
MS Id. XMAH) $0AT«TE<iy.
THE AUTHOR ANSWERS THE QUESTIONS
HE IS MOST FREQUENTLY ASKED.
Q. If you publish your ideas like this, aren't
you afraid aomaone will steal them?
A. Ho.
(Tha Law of Intellectual Property ia about
the strongest backing the individual haa in
thla society.)
Besides which, there is hare no revelation of
the Xanadu Sneakrets.
Q. Won't some big company sweep your Xanadu
under if they imitate it?
A. Let 'cn. If they come up with a ayatam having
equivalent scope, which seems unlikely (see
Canons, p.>\Sf ), I might even feei I had
achieved enough. But In the meentlme, like
the tortoise, and like DEC, I aa going to
continue to try to do It right .
Q. Aren't you afraid that writing a flippant book
will keep people from taking you seriously?
A. 1 do not want to be taken seriously In soma
quarters until it's too late.
From far away the children aaa tha tall goidan
X'a, ”0h. Daddy, can’t we atop? 1 want to play
Spacewar, 1 ' aaya little Johnny. Big Sla adds, "You
know. I have to check something for my paper on
Roman politics.” And Horn aaya, "Say, that would be a
good place for lunch.”
So they turn In peat tha aim that says "OVER
2 BILLION SCREEN HOURS,” and pull into tha lot. They
park the car, and Dad shows the clerk his Xanadu cred¬
it card, and the kids run to acraaoa. Dad and Mom
wait for a big horizontal CRT, though, bacauaa there
ara soma memories they'd Ilka to share togathar...
Sis'a paper, of course, goes to her teacher
through hla Xanadu console.
THE PUN. IS IT AS CRAZY AS IT SIEMS?
Deep inside, tha public wants It, but people
who think of computers In cliche’s can't com?abend
it. This means "the public” muat somehow create It.
One way to go ia to start a new corporation,
raglatar it with tha SEC and try to tales a lot of
money by selling 4»ock publicly. Unfortunately
there are all klnda of obstacles for that. ("Rag
A" la about aa far aa it will go.)
Through the-mlraele of franchising, new, a lot
of the difficulties of conventional backing can ba
bypaesed. Tha franchisee has to put up tha monay
for the computers, the acopts, tha adorabla purple
enamel building, tha Johns and ao on; aa a Xanadu
franchisee he gets the whole turnkey system and
certain teaponslbilitis, in the OVERALL XANADU NET¬
WORK— of which he ia a member. He la assigned
permanent storage of certain classes of materials,
on call from elsewhere In the net. (Naturally,
everything la stored in more than one place).
The Xanadu subscriber, of course, gets what ha
requests at the acraan as quickly aa poeaibla— or
>n priority if he wants to pay for It— and may
itora hla own files, including linkages among other
•aterlala and marginal notation# to othar thing)
that can be called. (Sea collateral itructuraa,
p.DM5i; these can automatically bring forth any¬
thing they're linked to. (See "Nelson's Canons,”
p.jp???.)) A user's historical record will ba
stored to whatever degree he desires, but not (if
he chooses) in ways (hat can be Identified with
him.
Home uae^e need only dial a tocel phone nia-
ber— their neareat Xanedu stand— to connect with
the entire Xanadu natwork. (The coat of using
something stored on the network has nothing to do
with where It la stored.)
(Special high-capacity Unas need not ba in¬
stalled between storage stations, as appropriate
digital transmission services ara becoming avail¬
able co«erc tally.)
i Vayi* 4) (wvj »*-eA m* ,
V”»»l (no !•<*!
I have beard rumors that someone else in the field
calls a computer product "Xanadu.”
1 tend to doubt this; and even if they did, my
usage goes back to 1966.
Various security techniques*prevent others
from reading a subscriber*, files, even If they
algn on faleely; the Dartmouth technique of
scrambling on non-etored keywords la a good ona.
5<0
\a,.Xv UeW -wcL-w
/ uould like to thank (in ohronological order)
Elliot Klugman, Hat CKubla m ) Kuhn, Clenn
Babeoki, Cal Danisle and John V.E. Ridguay
for the considerable time and involvement
they gave to the Xanadu program design sessions;
thanks also to various others vho eat in from
time to time. For the final selection of
algorithms, houevsr, no one it to blame but me.
I am grateful to the good offices of Suarthmore
College for the use of their equipment in the
continuing efforts to debug the Xanadu programs.
The Xanadu stand alao haa private rooms wlcb
multiple acraena, which can be ranted for parties,
bualneaa meet Inga, design sessions, brieflags,
legal consultations, lacturaa, ecsncaa, aaislcslaa.
The choice locations for tha Xanadu stands
ara somewhat different from hMburgcr spots. But
that's probably not anything to go into here.
Within the Xanedu network, then, people say
read, write, send maeeegas, study end.play.
tyei KfcJCLM/-
K"u Me me /rf
Thanks a lot, Sam Coleridge,
for tKose two symbols.
Xanadu.
And the Albatross.
“Liilcii," Mr. Wonka utd, "I’m an old man. Tin modi
older than yon think. I can'l go on forever. I’ve got no
children of my own. no family at all. So who is going to
run the factory when I get too old to do it tnytcll? Suiiir.mr'j
got to keep it going—if only ft>r the ukr of the Oompa-
Loompai. Mind you. there are ihouundi of clever men who
would give anything for the rhincc to conic in and lake
over from me. bui I don't uvin that son of person. 1 don't
want a grown-up person at all. A grownup won’t lisicn
to me; lie won't learn. He will try to do things his own way
and not mine. So I have to have a child. I want a good
sensible hiving child, one to whom I can tell all my most
precious randy-making secrets - while I am still alive.”
Roald Dahl, CherU. and the Chocolate Factory,
p.157.
I am sorry I have not been able
to reply to all those who have written
lo me saying they wish they could
work for The Nelson Organisation
al even a low salary.
So do 1, my friends, so do 1.
How are we going to sell the Home Computer?
Well if you want to sell computers, let me tell you what to do:
You've got to talk to the housewives, and the children, too;
No one wants to program, they want something they can view...
It’s got to offer fun, and it!s got to offor truth;
It's got to give you something that’ll lift you from the booth;
It's got to be uplifting to the Lady from Duluth.
You've got to have a vision; you've got to have an angle;
You should maybe sing a jingle (in a way that doesn't jangle);
It's got to have a tingle, in a way their minds can't tangle--
So continuing under our guidance inertial,
Let's have the JltffrHJG’ fA(L.
H *""‘0
|U. IwVt]
[KKU-uJ
XAN-A-DU, 00--
THK-- NORLD-- 0F-- Youuuv/
Is Xanadu worth waiting for7
That depends, doesn't it,
on the velum of thm hand-bush
differential bird utility ratio.
r
CftZY if/CA ffX
U4a?
3
7L
what mm
IS R&tUY SAYING-
e~i
u'sjtrjt* 4 ' / 't~
nnJT,pief * Ph-J)’
Fro* "Barnua-Tronic®"
(citation p. DM 2.)
11 Knowing, undmtandini *™l
freedom can all be advanced by the
promotion and deployment of com¬
puter display console* (with the
right program* behind them).
Computer prenenlatlonnl media,
coming soon, will not be technically
determined but rather will be new
realm* for human artistry This point
of view radically affect* how we
design man machine aystem* of any
kind, especially those for inform*
tion retrieval, teaching, and general
writing and reading Some practi¬
tioner. see such system* a* narrowly
technical, with the computer hoisting
up little pieces ol writing on some
"scientific" basis ond showing them
to you one grunt at a lime, A Metre-
cal banquet I disagree. The system.
should be opulent.
3) The problem in presentational
systems of any kind is to make
things look good- <**l tight.and come
across clearly. The things that mat¬
ter are the fee! of the system, the
iMer's state of mind, his possible con¬
fusion. boredom or enthusiasm, the
problems ol communicating concept*,
and the very nature of concept* and
their interconnection There will
never be a "science” of presentation,
except as it relates to these things
4) Not the nature of machines,
but the nature of ideal, is what
matters. It is incredibly hard to de¬
velop. organise and transmit ideas,
and it always will be But at least
in the future we won't be booby-
trapped by the nature of paper We
can design magic paper.
It is time to start using computers
to bold information for the mind
much os books have held this infor¬
mation in the past. Now information
lor the mind is very different from
"information for the computer'’ as
we have thought of it, hacked up
and compressed into blocks Instead
we can stretch the computer
I am proposing a curious kind of
subversion. "Let us design,” I soy,
and when people «cc the systems,
everybody will want one All I want
to do is put Renaissance humanism
in a multidimensional responsive con¬
sole. And I am trying to work out
the forms of writing of the future.
Hypertexts.
Hypertexts: new forms of writing,
appearing on computer screens, that
will branch or perform at the reader’s
command A hypertext is a non¬
sequential piece of writing; only the
computer display makes it practical
Somewhere between a book, a TV
show and a penny arcade, the hyper¬
text can lie n vast tapestry of infor¬
mation. all in plain English i spiced
with a few magic trick* on the
serren I, which the reader may attack
and play for the things he wanl*.
branching and jumping on the screen,
using simple controls as if he wen-
driving (i car. There can be special¬
ized subpart, for specialized in¬
terest*. instant availability of rele¬
vancies in all directions, footnotes
that are books themselves. Hyper¬
texts will be so much better than
ordinary writing that the printed
word will wither away. Heal writing
by people, make no mistake, not
data banks, robot summaries or other
clank A person is writing to other
people, just as before, but on magical
paper he can cut up and tie in knots
and fly around on.
I believe in calling a spade a spade
-- not a personalized earth-moving equip¬
ment module; and a multi-dimensional spade
by gum, a hyperspade-- not a personalized
earth-moving equipment module with augmen¬
ted dirt access, retrieval and display cap
ability under individulaized control.
I want a world where we can rend the world’s literature from screens rather
than personally searching out the physical books. A world without routine paper¬
work, because all copying operations take place automatically and formalized tran¬
sactions occur through formalized ceremonies at consoles. A world when* v.-o can
learn, study, create, and sha re our creations without having privately to schlepp and
physically safeguard them. There is a familiar, all-embracing motto, the jingle we
alt know from the day school lets out, which I take quite seriously: "No more pencils;
do more books, no more teachers’ dirty looks " The Fantic Age.
r ron "Coaputopia and Cybercrud."
(Citation nearby.)
WfEsro
My work is concerned principally with the
theory and execution of systems useful to the mind
and the creative imagination. This has polemical
end practical aspects: I claim that the precepts of
designing systems that touch people's minds, or
contents to be shown in them, are simple and uni¬
versal: making things look good, feel right and
come across clearly. I claim that to design systems
that involve both machines and people's minds is
art first, technology second, and in no way a deri¬
vative specialty off in some branch or computer
science.
However, presentational systems will cer¬
tainly involve computers from now on.
Since hundreds of such systems are now
being built, many of them all wrong, we must
teach designers (and certain others) the basics
of computers, and give them some good examples
to emulate (such as Sutherland's Sketchpad,
Bilzer's PLATO, and, I hope, some of my own
designs).
Further, the popular superstitions about
computers must be fought - the myths that they
are mechanistic, scientific, objective or indepen¬
dent of human intent and contemplative involve¬
ment.
Nqson's Onoi|*
It is essential to state these firmly snd
publicly, because you are going to see a lot
of systems in the near future that purport to
be the last-word cat's-pajama systems to bring
you "all the information you need. anytime,
anywhere.” Unless you have thought about it
you may be snowed by systems which sre in¬
herently and deeply limiting. Here are some
of the things which I think we will all went.
(The salesman for the other system will say
they are impossible, or "We don't know how
to do that yet,” the standard puldown. But
these things arc possible, if we design them
In from the bottom up; and there are many
different valid approaches which could bring
these things into being.)
These arc rules, derived from common
sense ond uncommon concern, about what people
can and should hove in general screen systems,
systems to read from.
1. EASY AND ARBITRARY FRONT E>JDS.
The "front end" of a system-- that is,
the program that creates the presentations for
the user and interocts with him-- must be clear
and simple for people to use and understand.
THE TEN-MINUTE RULE. Any system
which cannot be well taught to a layman in
ten minutes , by a tutor in the presence of a
responding setup, is too complicated. This may
sound far too stringent; I think not. Rich and
powerful systems may be given front ends which
are nonetheless ridiculously clear: this is a
design problem of the foremost importance.
TEXT MUST MOVE, that is. slide on the
screen when the user steps forward or backward
within the text he is reading. The alternative,
to clear the screen and lay out a new presenta¬
tion, is baffling to the eye and thoroughly dis¬
orienting, even with practice.
Many computer people do not yet under¬
stand the necessity of this. The problem is that
if the screen is cleared, and something new
then appears on it, there is no visual way to
tell where the new thing came from: sequence
and structure become baffling. Having it slide
on the screen allows you to understand where
you've been and where you're going; a feeling
you also get from turning pages of a book.
(Some close substitutes may be possible on
some types of screen.)
On front ends supplied for normal users,
there must be no explicit computer languages
requiring input control strings. no visible eso¬
teric symbols. Graphical control structures
having clarity and safety, or very clear task-
oriented keyboards, are among the prime alter¬
natives.
All operations must be fail-safe.
Arbitrary front ends must be attachable:
since we are talking about reading from text,
or text-and-picture complexes, stored on a
large data system, the presentational front end
must be separable from the data services pro¬
vided further down in the system, so the user
may attach his own front-end system, having
his own style of operation and his own private
conveniences for roving, editing and other forms
of work or play at the screen.
2. SMOOTH AND RAPID DATA ACCESS.
The system must be built to make possible
fast and arbitrary access to a potentially huge
data base, allowing extremely large files (at
least into the billions of characters). However,
the system should be contrived to ollow you to
read forward, back or across links without sub¬
stantial hesitation. Such access must be impli¬
cit, not requiring knowledge of where things are
physically stored or what the internal file names
may.happen to be. File divisions must be in¬
visible to the user in all his roving operations
(FREEDOM OF ROVING): boundaries must be
invisible in the final presentations, and the user
must not need to know about them.
3. RICH DATA FACILITIES.
Arbitrary linkages must be possible be¬
tween portions of text, or text and pictures;
annotation of anything must be provided for;
collateration (see p. "go ) should be a standard
facility, between any pair of well-defined ob¬
jects^ PLACEMARK facilities must be allowed
to drop anchor at, or in, anything. These
features imply private annotations to publicly-
□ccessible materials as a standard automatic
service mode.
The AI people don't understand,
the IR people don't understand,
the CAI people don't understand,
and for God's sake don't tell IBM.
Mi
I believe that an introduction to any
subject can be humorous, occasionally pro¬
found, exciting, vivid, and appealing even
to experts on their-separate levels.
Perhaps someday I can prove it.
*-^
4. RICH DATA SERVICES BASED ON
THESE STRUCTURES,
The user must be allowed multiple rover*
(movable placemarks at points of current activity);
making possible, especislly, multiple windows
(to the location of each rover) with displays or
collateral links.
The system should also have provision
for high-level mooting ( y and the auto¬
matic keeping of historical trails.
Then, a complex of certain very necessary
and very powerful facilities based on these things,
viz.:
A. ANTHOLOGICAL FREEDOM: the user must
be able to combine easily anything he finds into
an "anthology," a rovable collection of these
materials having the structure he wants. The
linkage information for such anthologies must be
separately transportable and passable between
users.
B. STEP-OUT WINDOWING; from a place
in such an anthology, the user must be able
to step out of the anthology and into the previous
context of the material. For instance, if he has
just read a quotation, he should be able to have
the present anthologies! context dissolve around
the quotation (while it stays on the screen), and
the original context reappear around it. The
need of this in scholarship should be obvious.
C. D1SANTHOLOGICAL FREEDOM: the
user must be able to step out of an apthology
in such a way and not return if he chooses.
(This has important implications for what must
really be happening in the file Structure.)
Earlier versions of public documents must
be retained, as users will have linked to them.
However, where possible, linkages must
also be able to survive revisions of one or both
objects.
5. "FREEDOM FROM
SPYING AND SABOTAGE."
The assumption must be made at the
outset of a wicked and malevolent governmental
authority. If such a situation does not develop,
well and good; if it does, the system will have
a few minimal safeguards built in.
FREEDOM FROM BEING MONITORED. The
use of pseudonyms and dummy accounts by indi¬
viduals, as well as the omission of certain record¬
keeping by the system program, aFe necessary
here. File retention under dummy accounts is
also required.
Because of the danger of file sabotage, and
the private at-home retention by individuals of
fileB that also exist on public systems, it is
necessary to have FIDUCIAL SYSTEMS FOR TELLING
WHICH VERSION IS AUTHENTIC. The doctoring
of on-line documents, the rewriting of history--
cf. both Winston Smith's continuous revision of
the encyclopedia in Nineteen Eighty-Four and
H.L. Hunt's forging of historical telegrams for
"The White House"-- is a constant danger. Thus
our systems must have a number of complex
provisions for verification of falsification, espe¬
cially the creation of multilevel fiducials (parity
systems), and their storage in a variety of
places. These fiducials must be locslizable and
separate to small parts of files.
7. COPYRIGHT.
Copyright must of course be retained, but
a universal flexible rule has to be worked out.
permitting material to be transmitted and copied
under specific circumstances for the payment of
a royalty fee, surcharged on top of your other
expenses in using the system.
For any Individual section of material,
such royalty should have a maximum: i.e., "by
now you’ve bought it."
Varying royalty rates, however, should
be the arbitrary choice of the copyright holder;
except that royalties should not vary sharply
locally within a tissue of material. On public
screens, moving between areas of different roy¬
alty cost must be sharply marked.
BIBLIOGRAPHY
Theodor H. Holaon, "Coaputopia and Cybercrud."
in Roger Levien (ed.), Coaputers
In Ins t ruction (Rand Corporation, 1971).
Theodor H. Nelaon, "A Conceptual Friatvork
for Man-Machine Everything." Proc. MCC 73.
%scd) Mf
v-wo)
drram, part the »lt el man ta »ar what dream
It *-«•: man n but an am, 1/ he fin about to n-
pound thi. dream. Mill, outfit 1 waa—there li
no man can tell wlial. Mrtlio«(|ht I wat,—and
■rlfcoufht I had.— but man it bo* a patrhed
fool, if he will oiler l" ear what nvrthontfit I bid.
The eee of man bath not heard, the ear of man
ball) not tern. man 4 , bind I. not able to tatlc.
hit Ih|th' !•> loixeiir, nor h.. brart to report,
what air dream »a»,
Bottom the Ueaver
Now you see why I brought you here.
This Gem-maniacal book has. obviously, been
created as b crossroad of several cross pur¬
poses: to furnish a needed, grabby layman's
introduction to two vast but rather inaccessible
realms: to present a coherent, if contentious,
point of view, and unroll a particular sort of
apocalyptic vision after preparing the vocabulary
for it: to make bright friends and informed sup¬
porters for my outlook and projects; to gel home
to some of my friends the fact that what 1 am
doing is at bottom not technical: and finally, if
nothing else, to set forth some principles about
the way things should be. which others will
have-to answer if they propose to do less.
Thus, overall, this book is a message in a Klein
bottle, wailing to see who's thirsty.
1 suppose it all started in collcgj. Sworth-
more left me with an exaggerated notion of the
extent to which ideas are valued in the academic
world; it took two graduate schools to clear this
up. After that, as far ns I was concerned,
Ph.D. stood for Poophead. But I still cared
about ideas, and the deep necessity of finding
their true structure and organization. From
writing I knew the grueling difficulty of trying
to make ideas get in order. I believed in the
pure, white light of inspiration and the power of
the naive but clever mind to figure out anything,
if not obstructed but dumb dogmas and obtuse
mental schemata fostered by the educational system.
When I finally got the idea of what compu¬
ters were about, sometime in 1960, I took endless
walks at night trying to hash these things out and
see where they led. The text systems came clear
to me, at least in their beginnings; in a few weeks;
the realization that 3D halftone was possible came
to me as a shock the following spring, I believe
as 1 was walking across Radeliffe Common. Since
then trying to build these systems for creation and
the true ordering of intricate thought has been my
driving dream.
My own life among these dream machines
has been a nightmare, thoroughly unpleasant,
and if people are right in telling me that nobody
wants systems like the ones I am designing,
I'll get the heck oul of this and be a disk jockey
or a toy salesman or something.
I first got into this as a writer; all I
wanted was a decent writing system that would
run on a computer. Little did 1 realize the im¬
mensity of what that entailed, or that for some
reason my work and approach would engender
indignation and anger wherever I went. There
is a fiction that everybody in these Helds is
doing something fundamentally scientific and
technical, and this Hction is usually upheld in
carefully enacted mutual playlets. Trying to
cut through that and say, "Let’s build a home for
mankind that will at last be shaped to fit man's
mind." does not seem to-generate immediate
warmth and welcome.
But I'm glad for the friends I've made in
this field, and of course there have been a lot
of laughs. (I’d really have hated to miss being
in this field, just for the thrilling madness of
it all.) All in all my adventures have been a
sort of participatory journalism, which I'd like
to write up properly some time. Some highlights;
The days of madness in '68, trying to
start an honest corporation to do all this stuff,
and suffering endless lunches with Wall Street
hangers-on who were looking for a vehicle to
take public. They wanted another chicken-
franchise type company, though, and certainly
not ideas.
Being briefed by four different corporations,
most of them major, on the fantastic powers their
interactive-movie system was going to have. One
of these briefings was in the board room of a
famous skyscraper. And now, only one of those
systems is left-- Kodak's.
Then there was the courtly gentleman who
was going to be my Noah Dietrich, my Colonel
Parker. He assured me that through his business
connections ell was going to go marvelously,
and then later intimated that as a special favor
he was going to put me in touch with other
universes and the flying saucer people. I just
didn't have time for other universes.
Then there was the suppression of my first
book (this is my second). You might say It waa
a misunderstanding, at least on my part. My
boss's understanding was evidently that the ad¬
vancement of my ideas would be detrimental to
his. If it had been a question of free speech in
Yugoslavia it might have been different. Well,
it takes a long time to get a book together, but
here we go again.
Then there was the lime I was called in
as a consultant on a vast federal system, never
mind whot. Numerous computer programs were
to be coordinated by a hypertext system they
had crested and they wanted to know if they'd
designed il right. It took months to find out
from the programmers exactly what the system
was , so I ended up writing the manual; after
which I explained what was wrong with the pro¬
ject and the whole hypertext system was scrapped.
And my job with it. I never quite got the swing
of consulting.
Flying coast-to-coast with the president
of a large corporation, he and I planned the
whole Xanadu budget for the following year at
something like half a million dollars, Two years
later, reduced In circumstances and driving a
yellow cab in New York, the miserable vehicle
breaks down in front of those same corporate
headquarters. And the reason I had that bad
taxi was that I was out of favor with the taxi
dispatcher, on account of having been absent
the previous week-- I had had to fly to California
to give a banquet address at the Rand Corporation.
Then there were my adventures with the
CIA.
I was sitting in my office at Vassar,
sagely advising a student, when the phone rang
und the caller identified himself as John W.
Kuipers, head of computer research at the CIA.
He told me I had been noticed as a new bright
young man in the field, and would 1 like lo
work for them?
Now. there is something about being a
cynic and a romantic. (They go together; the
cynic deflates ideas, the romantic falls in love
with them.) It is not impossible for the cynical
romantic to surmise that because everything he
has seen personally turned out to be so lousy,
that the true hope may lie at the heart of the
vortex, just where everybody thinks is impossible.
Also the Kennedy aftermath, when sophisticated
people had learned to laugh at simple idealism
as a facade for the real wheel-and-dealing,
slap-and-tickle. may have had something to do
with it; anyway, I was enchanted. Thus began
the Kuipers Caper.
YES, THERE IS A McLEAN, VIRGINIA
I was given a handler named Bob, a jolly
fellow, who kept assuring me that much money
was just around the corner. 1 was regaled with
success stories of other people in the computer
field who really, undercover Worked for Them.
(They weren’t doing anything very exciting,)
1 got to show my slides in the CIA office building
in Arlington, and to see there very fancy display
equipment behind shielded (!) double-doors in
a shielded (!!) computer room— shielded to keep
any planted bugs from transmitting out the con¬
tents of the computers' working registers. 1 even
got to visit the main CIA "campus" in McLean,
Virginia, where the sign says Agricultural
Research Station. It is an incredible feeling to
walk across that big eagle in the terrazzo,
and to be given the visitor's badge that says
"United States Government" all in wiggly lines.
They told me that they would be glad to
set me up in business as a hypertext company,
but 1 would have to have a corporation, because
that was the way they always did things. And so
it came to pass that The Nelson Organization, Inc.
was founded at the express request of the United
States Central Intelligence Agency. I wouldn't have
had it any other way. If life can't be pleasant it
can at least be surrealistic.
. . . BUT NO SANTA CLAUS
I was encouraged to write proposals for them,
and write proposals I did. (I happened to finish
typing the first one dufing a lightning storm,
and lightning crashed just as I was signing the
page; 1 felt like Faust.) I explained how hyper¬
text might have prevented the Bay of Pigs. After
due consideration, I did not say what hypertexts
might have done for the Warren Report. Numerous
jolly phone calls assured me that my first $25,000
was just around the corper.
The break came when Bob called me and
asked me to rewrite a proposal one more time.
He had circulated it, he said, among various
people "at the shop," who he reminded me were
holders of advanced degrees, and it had been
remarked that they found my proposal meaning¬
less: "Every place you say 'hypertext' you
could just as well put ’gobbledygook' instead;
you'll have to clear that up a little."
That did It. They couldn't read either.
Who turns out to be in charge of computer stuff
in the heart of the CIA, the inner sanctum, the
neat of vipers, but the same old poopy Ph.Ds.
I decided to resuscitate my virtue.
As far aa 1 know. there ia still not a
Decent Writing System anywhere in the world,
although several things now come close. It
seems a shame that grown men and women have
to rustle around in piles of paper, like squirrels
looking for acorns, in search of the phrases
and ideas they themselves have generated.
The decent writing system, as I see it, will
actually be much more: it will help us create
better things in a fraction of the time. but also
keep track of everything in better and more
subtle ways than we ever could before.
But nobody sees this— I suppose It's only
writers and editors that know they're trying to
"keep track of ideas"-- and I have been unable
to get this across to anyb ody. (The professional
writers, of course, won’t talk to me either.)
So here I am after fourteen years with
exactly two systems to show for it: the main one,
Xanadu, the text-and-animated-picture network
system, and Fantasm (J shouldn't have spent
the time but it was a labor of love), the simu¬
lated-photography system. Actually, I don't
have either of them to show, it’s all just flow¬
charts, but it turns out that if I work on either
of them with university equipment, my work of
fourteen years gets confiscated. So much for
that; the outside expedients for debugging con¬
tinue.
And, to lighten the burden, I've finally
given up on trying to reach professionals, who
evidently need a thick gravy of technicalism to
make the obvious palatable; with this bookity
I am taking my case to The People. It is there,
anyway, out in Consumerdom, that the real ac¬
tion is going to occur. So the important thing
is for everybody to know what’s really possible,
and what they could have. That is why 1 have
shot off my big canons (and this epistol).
To me, you see. this is really a holy
crusade, whereas I know guys to whom it's
just a living. It's no less than a question
of freedom in our time. The cases of Solzhenitsyn
and Ellsberg remind us that freedom is still
not what it should be. anywhere. Computer
display and storage can bring us a whole new
literature, the uniting and the apotheosis of the
old and the new; but there are many who would
not necessarily want to see this come about.
Deep and widespread computer systems would be
tempting to two dangerous parties, "organized ,
crime" and the Executive branch of the Federal
government (assuming there is still a difference
between the two). If we are to have the freedoms
of information we deserve as a free people, the
safeguards have to be built in at the bottom , now .
And the opulence which is possible must be made
clear to everyone before we settle on an inferior
system— as we did with television.
Some people have called my ideas and
systems "Orwellian." This is annoying in two
ways. In the first place it suggests the night¬
mare of Orwell's book Nineteen Eighty-Four ,
which obviously I want no part of. (But hey,
do you remember what that world of 1964 was
actually like? The cryptic wars against unseen
enemies that kept shifting? The government
spying? The use of language to twist and
manipulate? To paraphrase Huey Long; "Of
course we'll have 1984 in America. Only we’ll
call it 1972.")
The second reason the term "Orwellian"
is offensive is that it somehow reduces the life
of Orwell, the man, to the world of "1984."
This is a shallow and shabby thing to do to a
man who spent his life unmasking oppressiveness
in human institutions everywhere.
In the larger sense, then-- in homage to
that simple, honest, angry man, who cared about
nothing more than human freedom-- I would be
proud indeed if my systems could be called
Orwellian.
That reminds me. Nowhere in the book
have I defined the phrase "computer lib." By
Computer Lib I mean simply: making people
freer through computers. ThBt’s all.
Fantically— or fanatically —
Yours for a better world.
Before we have to settle for Any--
0 /
THE HOlf gAK\H CATA©G-
1 Lvt d ^re**-
lell . il 1* a Utile wio-
happens in Liila office
years will proba-
bly determine whether there
uneasy peace for the nest 21 yea
it w wee?
. Del
» III.
^'eii Itmi'lt-r.i mill WilllHin W.
I_tie I.irons It; (i mw l h A Hi * port fju IT Hi
CU H OF HOME'S l’ro)i cl on the 1>rerllea
meiit of Mankind Universe Kooks, pnper.
12 71 ,
‘ FOLKS In'N T NEEL) I HESE 1.1 1. SHMOOS'
| |(tv ALHF.AUY OUT OSK TH’ imiiiKST
SI I MOD OF ALL TIT EAKTH. ITSELF/
JtST LIKE THESE LI'L SHMOOS. TTS
HEADY T’OIVE EV’KVBODY EV’BYTHINU
THEY NEED” EF ONLY F'OLKS STOPPED
A HCIHTIN'. AN' A GHABUIN' THEY'D
KEE-UZE 1'IIET THIS SHMOO TH' EARTt
DOT PLENTY O' EVERYTHIN!'*
FU’ EVKYHODY 1 ’ "
. upii, I h if Life and T inms of 1 h* Sfirmtu
PockeTTftmks. 1949. PP 1JI 172 >
68
One of the world'* most exclusive clubs
Is si so one of Its most dlsmsl. It I* The Club
of Rome, founded by Itslisn businessmen Aurelio
pec cel. having (a* of 1972) some seventy mem¬
bers from twenty-five countries.
Their concern they cell The Predicament
of Mankind, or the "problematique." It is the
problem of growth, pollution, population, and
What's Happening In general.
On funds from Volkswagen, they have
sponsored studies which thinking men can only
regard as the most dismal in portent of anything
we’ve seen in years. Or ever.
Basically the prediction la that mankind
has perhaps forty or fifty years left.
Not because of war, or bombs, or dirty
movies, or Divine retribution, but far simple
economic reason*. However, the studies are
often called "computer studies." because compu¬
ters are the viewing mechanism by which we
have come to see these coming events.
MALTHUS AGAIN
In the nineteenth century, a pessimistic
economist named Thomas Maithus predicted that
there would always be starving people, because
people increased g eometrically - - expanding at
compound interest, with a fixed rate of increase
creating an ever-steeper growth-- while agricul¬
tural production, which muat feed ua all, expanda
arithmetically, not as a rate but a few acres or
improvements at a time.
This meant. Malthua thought, that there
would always be the starving poor. For various
reasons this did not happen in Europe. But the
regrettable soundness of the general principle
persists: when rates of food production can’t
nearly keep up with rates of population growth,
people are going to atarve.
This is basically the prediction.
DYNAMIC MODELLING
Basically what has happened is this. One
Jay Forrester, of MIT, haa for some years been
studying "dynamic models" of things, a new
breed of simulation which couldn't have been
done without computers. And now dynamic
models of the world's entire economic system
can be created and tried out.
Basically dynamic models are mathematical
complexes where things change at rales that
change themselves over time. For instance, the
more you eat. the fetter you get, and the fatter
you gel. Ihe hungrier you are going lo be. Now ,
just because this is simple to say in words, and
aounds as though mathematicians would have had
solved the whole class of problems centuries ago.
that's not how it is. The intricacy of such
models, even for just a few variables, made it
impossible to foresee what happens in auch com
plexea exact by techniques of computer enactment.
Forrester, who has studied auch systems since
the fifties, has become aiert to their problems
and surprises. The culmination of his work has
been a model of the entire world's economic
growth, agriculture, population. Industrialization
and pollution; this Is described ir> his book
World Dynamics (Wright-Allen. 1971).
The insidious portents of Forres¬
ter's worji did not go unnoticed. The
dangers of population increasing at com¬
pound interest on a planet of unchanging
size, and further derivatives of these
changes, suggested that things might be
getting worse than anybody thought. An
alert Italian businessman brought togeth¬
er a group of scholars from all over the
world to study these problems, and called
the group The Club of Rome. Their first
work is out now, and it is very scary
and all too real. The book is called The
Limits to Growth . -
Basically what they have done is a
very elaborate computer simulation,
modelling the entire economy of the planet
in the years to come as a structure of
rates. They have taken into account
population, food-growing capacity, indus¬
trial growth, pollution, and a lot of
other things. The model is precise and
elaborate.
Unfortunately the findings are pre¬
cise and simple.
They tried all kinds of alternative
futures using the model-- what would
happen if the birth rates were different?
*hai if there were no pollution? What
if resources were infinite?
The results of the simulations are
always the same.
According to all the simulations,
the human race will be wiped out-- mostly
or completely-- by the year 2100.
Let's go briefly through the model.
Note that it can't be exact, and we can't
know what years things are going to hap¬
pen. The curves themselves-- the shape
of things to come-- tell the story all
too clearly. (For those who would like
a little more drama with their numbers,
finding these matters too abstract, I
strongly recommend the very beautiful
Indian film "Distant Thunder," a sort of
"Mr. Smith Starves to Death." Or just
stick around awhile.)
HUH?
The model assumes that birth rates
stay relatively constant in particular
parts of the world, and that new land
and agricultural techniques increase food
production in relatively well-understood
ways.
Now for the good news. Food pro¬
duction also tends to increase:
Now for the bad news. The running
ratio of food to people, Food per Capita,
takes a sudden nose-dive. And then so
does population.
It is not any individual prediction that is
frightening, since ihe numbers plugged into the
separate runs are merely hypotheses, lo show
the shape of the consequences. It Is the overall
set of runs that ia so ghastly , because they al¬
ways come out the same.
PAY CLOSE ATTENTION
Now, it is important to clarify what is
happening here and what is not. What is not
happening: an oracular pronouncement by "the
computer,” showing some transcendental predic¬
tion by a superhuman intelligence. What is hap¬
pening; people are trying out separate possible
assumptions lo see what their consequences are,
enacted by the computer according to the economic
rules they set up. Result: always the same.
Any aet of rules, played out in the unstable
exploding-population world beyond the seventies,
appears lo have similarly dire results.
WHAT HOPE IS THERE?
The original model is only an approxima¬
tion. and the basic results, as published in The
Li mits to Growth (sec box) reflect those approx¬
imations. One of the things that can be done is
lo fill in and expand the model more, to see
whether any hopes can be found in the details
and fine cracks which don’t appear from the
gross results. And, of course, to study and
re-study the basic findings. (For instance, a
small error was recently found: a decimal point
was misplaced in the "pollution” calculation,
leading tc an overstatement of the pollution in
some of the runs. (Bui pollution, remember, is
only part of the problem.)
So there you arc. This is a study of the
greatest importance. We may. just may. be get¬
ting wind of things In time lo change the outcome.
(If only we knew how. But again, this study
is where serious discussion must begin.)
I-1
IBM IS BULLISH ON THE FUTURE
Lewi* M. Branscomb, who haa tha awe-
soma title of Chief Scientist of IBM. has been
giving numerous talks recently that seam to be
directed against paaslmlsm resulting from the
Club of Rome studies.
"'On th* shoulders of the Information
processing community rests the responsi¬
bility for convincing the public that we
have the toole, if it ha* th* will, to ad-
dr*** th* complex *yatema management
problems of the future.’ Branscomb **ld.
"'More than any other profession
our community can restore the public's
confidence that from tha limited resource*
of tha world can be fashioned a Ufa of
wall managed abundance fur ail.' he
concluded ."
(Keynote speech. ACM 73. quoted
in Computerworld . 3 Sep 7], p. 4.)
Now begins the winter of the world.
We are poisoning everything.
With so little time left, we are of course
expanding and accelerating every form of pollution
and destruction.
We ere killing the last of our beautiful
brothers, the whales. Just to provide marginal
amortization of the whale-ships that are going
to be acrapped anyway.
Item: supposedly the Sahara Desert was
man-made . It is growing fast.
Set down upon this beautiful planet, a
garden spot of the universe, we are turning It
into a poisoned pigsty .
You and I may starve to death, deer reader.
In some year fairly soon now, around the turn of
the century, there will no longer be nearly e-
nough food for the teeming billions.
That, anyway, is what the predictions say.
The predictions are compelling, not becauae a
computer made them -- anybody can make a com¬
puter predict anything - but because the prem¬
ises from which the predictions grow were
very well thought out.
It is now up to us to make the predictions
come out wrong.
Not by killing the bearer of bed tidings,
or by pretending they were not clearly stated -
but by seeing what possible alternatives remain
in the few momenta of real choice we may yet
have-- scant years at beat.
To haggle now about ideology ia like ar¬
guing about who is driving while we are headed
toward a brick wall with the gas pedal jammed
to the floor.
The public thinks, "science will save us,"
a view at which many scientists snicker bitterly.
Perhaps wc will be shrunk to an inch's height,
or fed on rocks, or given gills and super-kidneys
to live in the ever-me re-poisoned sea. Or per¬
haps wc will do what science says others have
done: die out.
This science-will-ssve-us ostrich-position
is nicely exemplified by Albert Rosenfeld, Science
Editor of Saturda y Rev lew / Wor ld ■
Since "science” has given us the Boeing
747 and the neutrino, neither of which could
once, he thinks, have been imagined possible,
obviously (to him) science can do anything else
we think is impossible! He fully imagines that
science will come up with something to lake
care of geometrically increasing numbers of
people. In perpetuity?
"Take a lesson from the neutrino," he
says. "Wc can solve our problems." ("Look
to the Neutrino. Thou Doomsayer," Saturday
Review / Worl d. Feb 23 1974. 47.)
OTHER FUN
The growing diffusion or weapons and
grudges, and Ihe great vulnerability of almost
everything, assure that terrorism and political
extortion will will increase dramatically for
the foreseeable future. On the other hand,
whole economic blocs and industries have
lately mastered and demonstrated by example
how to hold the country at bay in order to
get tjeir wishes; as everybody can see what's
happening, and learn from it. the number of
wrenching unpleasantnesses created by terrorists
and industries and interest blocs will ircri-ost .
All these wore essentially forescon by
Thomas C. Schelling In his masterly 1960 work.
The Strategy of C onflict , Schelling formalizes
a theory of intimidation as pari of his study of
communicating adversaries. (His Is a st ructur al
rather thun a psychological study, examining
the properties of situations whether or not they
arc psychologically perceived. Regrettably,
perception of situations is improving all the
Cousteau says Ihe ocean* are dying
a lot faster than he anticipated
-- and give* mankind fifty year*
after life enda there.
But even if everything else were all righl.
the Breeder Reactor* are sure to get u*. I refer
to those wonder machines that the electric com¬
panies are calling Clean Energy for the Future.
What is not explained with such slogans ia that
breeder reactor* not only create energy, they
create atomic waste, breeding new fissionable
material-- including plutonium. Plutonium is
well named for the ged of hell. Chemically a
poison and radioactively a horror. II does not
go away; wherever we put it. it will get back
to us.
The mere radiation from the atomic crap
is hardly the problem. The radioactive polaons
are getting into the oceans. They are getting
into the clean waters of Ihe land. (A December
1973 new* report, for Instance, revealed that
a 1968 leak of radioactive chemicals was into
the water supply of Bloomfield, Colorado.) Now,
atomic enthusiasts call It a Disposal Problem,
like the queation of where to bury the garbage.
But it's a vary different problem. Wherever we
put It, it will come beck. The sea’ No. that’ll
be poleoned after the containsrs go. Deep wells' 1
The mountains? But there Is no place that can¬
not be guaranteed against earthquake and re¬
cycling. II will com* back. Though dosens of
generations might survive It, it will be waiting.
But the breeder reactor* multiply this
output. Perhaps we could survive the the waste
for a few hundred years, mi it cornea back out
But the other part of It la the nasionebie material
which can be made into backyard bombs.
That's the kicker. With more and more
fissionable crud being disgorged, its availability
for terrorists who want to build their own in¬
creases. Ralph Lapp pointed out last year that
the stuff was shipped In unguarded trucks, and
one or two good hijacking* would enable any
bright kid to build hia own dirty A-bomb. By
the year 2000 It is nol inconceivable thsi bootleg
atomic weapons will be aa widespread as hand¬
gun* in Detroit-- and as much uaed.
But now. with the breeder reactors - ir
lots of countries-- pouring the atufT out. the era
of atomic plenty is here. The smaller countries
who want them are getting their atomic weapons
- though holding back assembly of the parts,
for various reasons. It ia generally believed
among bomb-watchers, far instance, that India
and Israel have theirs anytime they want.
Add this to the greet avalanche of missiles,
tall and homy in their ailos, ready to go on two,
later three or four, sides. (The U S. official
arsenal now stands at the explosive equivalent
of 5 billion tons of TNT. a ton or TNT for every
human being. And that's just the explosive part,
not the fallout; a fraction of these bombs could
destroy ell life on earth by its seething residue.)
And now. because of the SALT talks, we may
expect a new and drastic increase of this Readiness
Posture. Hoo boy. What ia there ti any.
So there it is. folks, merry times ahead.
Humanity may end with a bang (thermonuclear
exchanges, or Just desultory firings urtil we’re
all poisoned or sterile), or a whimper (universal
starvation), or, I would anticipate, some spastic
combination of the two. and all within the (pos¬
sible) lifetime of the average reader. This Is.
at any rale, what I think most likely.
Except of ecu me we won't see it happen
that way. We'll watch the starvations on TV
(as we did Biafra, Bangladesh, now West Africa,
wliot next... India?), and tsk about the poor
foreigners who can’t take cere of themselves.
And as the problems increase and move toward
out heartland, it'll be blamed on environmentalists
and on the news media, till bang.
Or maybe not. Just maybe.
But we've aii got to get access lo the Club
of Home models, and look for holes or strategies.
If computer modelling systems doing this kind of
work arc made widely enough available, perhaps
some precocious grade-schooler or owlish hobbyist
will find some way out that the others haven't
hit on...
We've got to think hard about everything.
BIBLIOGRAPHY
Frederick Pohl and C.M. Kornbluth, The Space
Merchants. Ballamine, paper.
Thomas C. Schelling. The Strategy of Conflic t.
Paper.
The Grcot American Bomb Machin e (citation not
handy). Paperback.
A book culled Cold Dawn (citation not handy;
originally published in the New Yorker )
presents a most discouraging view of
this country's actions ir the SALT lalka.
One Access Catalog, nol lo be named here, gives
a recipe for an atonic bomb. Very funny,
ha ha. "The U-235 we are using, (although
Plutonium will work just as well) is a
radioactive substance anti deserves some
cart In handling. II ia NOT radioactive
enough to kill with limited axpoaurc. but
don't sleep with it or anything." And *o on.
Thanks a lot. fellaa.
Ralph Lapp had a piece in the Now York Time s
Magazine last year, pointing out that
plutonium ia shipped in unguarded truck*
and it's only a matter of lime before
purks get their hands on il...
A piece in a recent Esquire . "Did There Ever
Com* a Point in Tim* When Thera Were
Porty-Three Differenl Theories about
Watergate? Yea. to the Best of Our
Recollection.” la a very helpful general
w>urce, especially far those who suspect a
connection between "Walergele" and the
assassinations of the Kennedy*. Malcolm
X. Marlin Luther King. etc. But for a
real chill see "Mae Brussel!'* Conapiraey
Newsletter" in the March (?) 1974
Realist, as well as "Who la Organized
Crime and Why Are They Saying Such
Awful Thing* About It." same iaaua.
Glen A. Love and Rhoda M. Love. Ecological
Crisis : Reading* for Survival . Harcourt.
$4 (paper). A quick way lo catch up on
soma bad stud. Four bucks well spent.
William Lelaa. Tit* Domination of Nature .
BrazUler, 17.
For a dazzling, romantic and optimistic viaw of
the future, aee Dimension* of Chang* by
Don Fsbun (Glencoe Pres*. 85 in paper).
The Futurist magazine goes out lo member* of
ihe World Future Society. An Association
far The Study of AHemetive Futures.
Post OITlci Box 30368, Bathsada Branch.
Washington. DC 20014. The magazine
used lo be pretty sappy and optimistic,
but teams lo be acquiring sophistication.
.tun*Id kotulak, "The Lifeboat tthic."
Chicago Tribune Magazine , 29 Apr 74,
Of courts, population continues
67
Would you believe that the greatest avail¬
able computer service is for the kiddies?
For four bucks and a half, an outfit called
Me-Books will send, to a child you designate,
a story of which he is the hero, in which his
friends and siblings appear, and whose action
involves his address and birthday.
Kids adore it. Children who don’t like
reading treasure the volumes; children who do
like reading love them just as much.
I can personally report, at least on the
basis of the one I ordered (M^ Friendly Giraffe )
that the story is beautifully thought out. warm,
loving, and cleverly plotted. In other words,
far from being a fast-buck scheme, this thing
has been done right . It's a splendid children’s
story. (I won't reveal the plot, but the Giraffe's
birthday, name and home address are related
to those of the protagonist.)
Moreover, it has three-color illustrations,
is on extra-heavy paper and is bound in hard
covers .
(In case you're interested, any of the
three programming languages expounded earlier
in the book would be suitable for creating a
Me-Book: depending on the language chosen,
the holes left for the child’s own name would be
alphabetic variables, segment gaps or null arrays
-- anyhow, you could do it.)
Astute readers of the Me-Book will note
that while it's not readily obvious, only the lines
on which personalized information appear have
been printed in the computer's lineprinter. The
others have all been pre-printed on a press.
Indeed, the personalizations appear on only one
side of each page, the whole book being one
long web of paper that's run through the line-
printer just once before being cut and bound.
But it's so cleverly written and laid out that the
story moves on beautifully even on the pages
that don’t mention the child's name.
As an experiment, the author tried sending
for a copy of M^. Friendly Giraffe as told about
a little boy named Tricky Dick Nixon, residing
at 1600 Pennsylvania Avenue in Washington, D.C.
The result was extremely gratifying, and well
worth the $4.50. Herewith some excerpts.
' ,34< <563005
««o. s .
* D »fi£S S ; HE
CAr! S Mtti
BOOK S pL?" E:
4d DRR.S<;T S
Tr ic
1600
u »shj
jQly
s Piro
"itch
Vesco
The
T He
BOOK SHIPPED TO GBOUM-UP
,,, r in a place called
Once upon » tilt. i v
►here 1 ived a little boy
Washington, there
nailed Tricky Dick Nixon.
.... «.», ncK ..-t 3- » «*■«» —
He had adventures that other little bo/s and g
just dreaa of*
This is the .tot, of on. of his siver.tatos.
It „ the stoij of the da, thst tsi«Y «<*
a giraffe.
As the giraffe cane closer and closer.
Tricky Dick started to yonder hoe in the
vorld he las going to look him in the eye .
Tricky Dick knew there *ere uo jungles in
Washington. Especially on Pennsylvania Ave.
But Tricky rick »«•* «« * U ’*- le '° rri ' a '
pirst, because he “as 8 ,er * b - a? * la "' le b r
End second, because he knew that his fnena,
giraffe, -ever take hi. anyplace bad.
hoee.
Tric *' Dib *
B ' Ck i" "ashingtoo.
on Pennryi vaaia
vit h
a story to
- h ;,- t# teu tis
Lcky ft
•lCK
tiding off
Houid
f Relieved if
that
on the
‘Ml’t seen
B ' C ‘ lMb b e a here
ki* that day.
ciraff e . s
Oack.
to the
hose who
would be aany other exciting adventures
icky Dick and his friends.
iybe, just aaybe, if you're a very good
PERSONALIZED ME-BOOKS'*" NOW AVAILABLE:
c yw'
Friendly Giraffe
Your child and the chiids (needs
and pels take a iungie mp with
a friendly giralle Personalized
m over 70 places
c7VI y*
Birthday Land
Adventure
People m me land ol candy and
cake lell all about your chiids
exact birthday Irom birlhslone to
lamous birthdays
c7Vly~
Jungle Holiday
T ho child ol your choice and
the giralle visit the animals m
an amusement park Personal
ized throughout
cTWy-
Special Christmas
As Santas helper, your child
visits the Santas ol ihe different
countries and learns the true
meaning ol Christmas
For additional Me-Books" 1 written around a child ol your choice, complete an
order lorm at your lavorite bookstore or write Me Books Publishing Co . Dept
MB2 11633 Victory Blvd . North Hollywood Calil 91609 Enclose *3 95 plus
50C lor postage and handling (Caht residents add 20* lor sales lax ) Be sure
to slate which Me-Book“ you desire and include the following information
KKS(MUII2(D STORY DAU
II ten*" .1,10, «,bgn b*o. it n(H i»*tibk o< ** JoeKAtu* Lt«l RUHR I hi < hjiniH U«r »« be «uttr» «t"oi,l *1
RRIHI CltARll. cm OuiAciti p«> soict amt Me space brim, mips It urn* ft.ilttflli
II *ot enoofi, space *bbte»*W
CMIV.M ^ *"** b * H T !<««•» hMlKI Mil
I MUM L,ahu IMIllirikl____
c.m> wviw-.ir.-M *imimi ij* nan liRn i„u_ lawu>
Abcul these fcstny ausnheps
cnyoup checks.
You will note that aU bank checks now
have funny-looking numbers along their bottoms
They go like this:
O IHU5 E,?m
The numbers are odd but recognizable.
The last four thingies are punctuation marks,
which presumably can mean anything the pro¬
grammer wants them to. (J n other words,
frankly, I don't know their names or standard
functions.)
which stands for Magnetic Ink Character Recor¬
ding. They are printed in magnetic ink-- not
magnetic go’s you could record on it, like mag¬
netic tape, but chock-full of iron and vitamins
so that as its blobs whiz past a special read
head, they cause a specific sequence of pulses
in the parallel circuits of the read head that can
be decoded as the specific number or mark.
The MICR system was designed in the
late fifties, with the technology convenient at
that time, and would certainly not be designed
that way now. Nevertheless, these weird-looking
symbols have inspired various
RIDICULOUS TVPE-FflCES,
which apparently look to the public like the
latest hotcha whizbang zippity up-to-date futur¬
istic stuff, even though to the knowledgeable
person they bring back the late fifties. (In
fact there are no letters in the MICR character-
set.)
What, then (you may ask) would symbols
designed for computers look like if they had
been designed more recently?
We were just getting to that. In fact,
there are two such alphabets, called OCR (for
Optical Character Recognition). They have
been standardized so everybody can design
equipment and/or programs to work with them.
They are called the A and B optical fonts, or,
for completeness. OCR(A) and OCR(B).
They are very disappointing.
OCR (A) is a little sexier. At least it
looks like something . (Evidently it's slightly
easier to deal with and design for.) But the
other one, OCR(B), just looks like the alphabet
next door. Here they are.
ABCDEFGHIJKLfl
NOPflRSTUVUXYZ
0123451,75=!
. : :,= + /$*"S
» -<>y.r j’sm
ONA0o*a£¥
1234567890
ABCDEFGHIJ KLM
NOPQRSTUVWXYZ
abedefg hijk Lm
nopqrs tuvwxyz
* + - = /.,
?!()<>C]%£&a A
b£$|\| - ¥
0Cxl(a)
OCK(t)
66
THE ESS
The national phone company (usually
called affectionately. "Ma Bell") has drastically
changed its switching methods in the last few
years. They are replacing the old electromech¬
anical switches, or "crossbars," with a new
device called the ESS, or Electronic Switching
System. If there's one in your area you may
hear about it in their jolly news sheet that you
jet with the bill.
In the old crossbar days, a phone con¬
nection was a phone connection and that was
that. Now. with the ESS, all sorts of new com¬
binations are possible: the ESS has stored pro¬
grams that determine its operation. If you
dialled a non-working number, it jumps to a
program to take care of that. It does all sorts
of things by special program, and new programs
can be created for special purposes. Now the
phone company is trying to find the services
that people will pay for. Having calls rerouted
temporarily to other numbers? Linking up
several people in a conference call? Storing
your most-called numbers, so you can reach
them with a single or double digit?
These particular services are now being
offered experimentally.
The way it works is this: there are a
number of programs stored in a core memory;
the only "output device" of the system consists
of its field of reed switches, arranged to close
circuits of the telephone network.
Depending on the numbers that have been
dialled, and whatnot, the ESS jumps to a specific
program, and that tells it to connect an incoming
call to particular other circuits, or to ring other
lines, or whatever.
It's really neat.
There are only a couple of things to worry
about.
One is that it makes wiretapping, not a
complex bother involving clipped wires and men
hunched over in cramped spaces, but a simple
program.
Another is that some people think that
blue-boxers (see nearby) may be able to program
it, from the comfort of their own homes. Mean¬
ing that not just court-authorized wiretaps, but
Joe Schmoe wiretaps, would be possible. Let's
hope not.
la
HiWOfifcAPft
This has been around for decades, and
has nothing to do with computers, but isn't it
nice?
You write with a pen attached by rods
to a transmitter ; somewhere else, a pen attached
by rods to a receiver duplicates what you have
written.
What is being transmitted consists of the
measured sideways motion ("change in x"), the
measured up-and-down motion ("change in y"),
and the condition of the pen ("up" or "down").
What would these days be called "three analog
channels, multiplexed on a single line."
These only cost a couple of hundred dollars.
Why has nobody been using them for computer
input?
Minicomputers handle various
Sugar Creek, Texas will have 3000 homes
with a minicomputer-based alarm system. Evidently
various automatic sensors around each house sniff
for fires and burglars, as well as providing panic
buttons for medical emergencies.
The system uses dual Novas (one a backup),
and prints out the news to fire and police dispatchers
on a good old 33ASR Teletype. (Digital Design.
May 73, 16.)
(Mi 0? TUOtf wv
"Overpay your phone bill by one cent.
It drives the computer crazy."
Nope. The amount of payment gets
punched in and goes through the gears
quite normally.
If you want to put together your own computer-on-a-chip,
or any other complex integrated circuit, a complete simulation-
verification-layout-and-fabrication service is available from
Motorola, Semiconductor Products Div. , P.O. Box 20924, Phoenix,
Arizona. Presumably it costs a mint, but after that you can roll
out your circuits like cookies.
Your circuit is overlaid on their beehive-chip of logical
subcircuits, called a Polycell. You use their MAGIC language
(Motorola Automatically Generated Integrated Circuits), which
then feeds a resulting circuit data structure to a program called
SIMUL8 (yuk yuk) to try out the circuit without building it.
That way you can supposedly be sure before they make the final
masks.
[ always figured that the day of Computer
Hobbyism would arrive when the folks at Heathkit
offered a build-it-yourself computer. But you
know what they came out with instead lust year?
A general interface for hooking things to the PDP-8.
It was a truly stellar group that reported to
Judge Sirica on 15 Jan 1974 that the 18-minute
Watergate tape buzz had at least five starts and stops.
The six panelists included:
Richard Bolt, a founder of
Bolt, Beranek and Newman, Inc.
Franklin Cooper, head of
Haskins Laboratories, >
Thomas Stockham, audio resynthesizer
extraordinary (seep.lj^M)
The news, however, generally referred to
them as "technicians."
QWi^TONG,
Jv
a swell video game now in bars, probably
controls the four-player pingpong on the screen
with a minicomputer or microprocessor.
Especially exciting is the social possi¬
bility of horizontal screens for other fun inter¬
personal stuff. As well as collaborative work.
(But boy, let's hope the radiation shielding is
good.)
O
O
The Computer Diet by Vincent Antonetti (Evans Pub.)
shows the author sitting on the deskplate of a 360 console.
The inside consists principally of charts he recom
mends for weight lose. "The power of a modern digital
computer" interpolated the tables. A slide rule might have
have been simpler.
The thing is, he presents a paper on the thermo-
lics of weight loss which may be important; in this he
the difference equations which are the heart of his
T
Kirk Brainerd. of L.A., is using compu¬
ters for a registry of people with something to
teach. He hopes that if people are mutually a-
vailable to each other at a deep enough level,
people can begin to act out of altruism in general.
A8TROPLASH. etc.
There are various computerized astrology
services. Given your date of birth, and hour
if known, they'll type out your signs. explan¬
ations, etc. Presumably there is a text network
which the system selects among according to
"reinforcing tendencies," etc., among the entities
thought to be influential.
Conceivably this could do nine-tenths of
what a talented human astrologer does, and with
the same validity, whatever that may be. In
any case it’s probably a lot cheaper.
COMPUT-
EROTICA
ROT
m
Is it too soon for a
computer pornography contest?
(Is it too late?)
See p. "?*>"•
People think computers are rigid
and invariant. This (as stated else¬
where In this book) is due to the systems
which people have imposed , and then
blamed, on the computer.
The fact is that computers are now
being set up to give new flexibility to
manufacturing processes. Computers,
directly connected to milling machines,
grind metal into any conceivable shape
much faster than a human craftsman. To
change the result, change the program--
in a fraction of a second. Fabric des¬
ign has been done on computer screens;
the obvious next step is to have the
computer control the loom or knitting
machine and immediately produce what-
ever's been designed.
Custom clothing: soon we may look
forward to tailoring services that store
your fteasurements and can custom-tailor
a suit for you to any new fashion, in
minutes. (But will the price beat Hong
Kong?) Customized printed matter is
already here (see "Me-Books," p.6"7).
Wherever people want individual varia¬
tions of a basic manufacturing process,
computers can do it.
The Telephone Company (at least in
Illinois and Indiana) offers a speaker on
"The Shadowy World of Electronic Snooping"
to interested groups.
Modern uiuqt, she 29, interested
in recursive relations and reverse
Polish culture. Phone a must.
Contact box RS-232 (t see p.
BETCHA DIDN’T KNOW...
that the IRS hasn't been able to do Instant
matching of W-2 forms to tax returns. That'U
be fixed in fiscal *74. and interest and dividend
peymenU in '75. (TIME, 31 Dec 73, 17.)
Y&wmit, u-ep**)
This is an outrageous misnomer. The
computer is only carrying out, most speedily,
what hardened politocoes have always done:
FACTIONAL ANALYSIS, now possible with new¬
found precision on the basis of certain election
returns.
This is based on the cynical, and fairly
reliable, view that people vote according to
what faction of the greater populace they belong
to-- middle-class white liberals, blue-collar
non-union members, and so on. The factions
change slowly over time, and people move
among them, but the fact of factionalism remains
unchanged.
Well. By the close of a major election
campaign, most factions can be pretty well pre¬
dicted, especially as to presidential choice, or
what proportion of that faction will go for a
given candidate.
But some factions' reactions are not cer¬
tain up to the day of the ballot.
So. "Computer predictions” of elections
basically break the country into its factional
divisions, state by state and district by district,
and then tabulate who can be predicted to vote
for whom on a factional basis.
Then what's the suspense?
The suspense comes from the uncertain
factions — groups whose final reactions aren't
known as the election starts.
Certain election districts are known to
be chock full of the types of people whose reac¬
tion isn't known.
The final "computer prediction" simply
consists of checking out how those districts
voted, concluding how those factions are going
in the present election, and extending this pro¬
portion through the rest of the country.
It’s often painfully accurate-- but, thank
god, not always. When it isn't don't blame
"the computer." Thank human cantankerosity.
THt W c^ecXoor eooflJ^
may or may not be a real computer-- friends
have told me St isn’t— but it's certainly a good
idea.
When you pull your late-model Volkswagen
into a dealer's service area, the guys can just
roll out a cable and plug it into the corresponr
ding socket in your vehicle. At the other end
of the cable is some sort of device which tests
a series of special circuits throughout the car
for Good Condition. These circuits indicate
that things are working properly-- lights, plugs,
points, brakes and so on.
This is the same technique used by NASA
up to the final moment of COMMIT LAUNCH-- a
system of circuits monitors the conditions of
whatever can be monitored, to make sure all's
functioning well. It's more expensive to wire it
up that way, but it makes checking out the
rocket-- or the car— that much eaaier.
65
YOUR AUTOMOBILE COMPUTER
Didja know, huh, we're going to have
computers in our cars? We refer here to two
things—
anti-skid controllers . which are realty
just special circuits-- you know,
"analog computers"— to compensate
among skidding wheels. Turns out
that this is apparently more sensi¬
tive and reliable than even your good
drivers who enjoy controlling skids.
Already advertised for some imports.
grand bus electronics (see p. )• Since
the electrical part of the automobile
is getting so blamed complicated,
the Detroit Ironmongers have decided
to switch to a grand bus structure
instead of having all those switches
and things separate anymore. Should
make the whole thing far easier to
service and customize.
Presumably this will all be
under the control of a microprocessor.
(See ■) This means that the
car can have things like a Cold-
Weather Startup Sequence-- a program
that starts the car, turns on the
heater, monitors the engine and
cabin temperature, and bleats the
horn, twice, politely when it's all
ready-- all at a time preset by the
dashboard clock.
Presumably Detroit is not yet
planning to go this far. But because
of the auto industry's anomalously
huge influence in America, some have
expressed the fear that this move
-- toward the integrated-circuit,
digitally-controlled grand bus—
would effectively put Detroit in con¬
trol of the entire electronics industry.
The ever-clever Japanese are computerizing
faster, better and more deeply than we are.
They now have a prototype taxi operating
under computer control. They're calling it, at
least for export, Computer-controlled Vehicle
System (CVS).
Basically it's like an Elevated Railway—
you climb up and wait-- but when you get in,
you punch a button for your destination. Accor¬
ding to Hideyuki Hayashi of the Ministry of In¬
dustry and International Trade, the system will
be operational in Tokyo within the decade, and
is the "cleanest, safest, quickest transport sys¬
tem ever devised by man." Think fast. Detroit.
(A nice point: one of the most important
features of such a system is that the vehicles
don’t react to each other, as do vehicles in the
existing Human-controlled Vehicle System (HVS).
A whole line of the cars can be accelerated or
slowed simultaneously, a crucial aspect of their
flexibility and safety. Nothing con possibry
go long.)
(Leo Clancy. "Now-- Computer-Controlled,
Driverless Cars," National Enquirer 3 Mar 74,
24-5.) ~
SIC TRANSIT
Some of the sappier new Urban Transit
Systems give you a ticket with a magnetic stripe
on the back. Each time you ride you must push
the card into an Entrance Machine, which pre¬
sumably does something to the stripe, till finally
the ticket runs out and you have to pay more
money.
Secrecy of the recording code is an impor¬
tant aspect of the thing. Indeed, waggish gossip
claims that some such systems start with a blank
magnetic stripe and just sdd stuff to It, meaning
the card can be waahed clean with a magnet by
larcenous commuters. But this seems unlikely.
THOSE THINGS ON THE RAILROAD CARS
As we lean on the fence a-chawin’ an'
a-watchin' the trains go by. we note strange
insignia on their sides, in highly reflective
Scotch -Lite all begrimed by travel.
Basically it's a stack of horizontal stripes
in red, blue and other colors. This Is ACI,
for Automatic Car Identification , R may yet
straighten out the railroads.
In this neolithic industry, it is not known
at any given time where a railroad company a
cars are, and aomo peculiar etiquette governs
their unrequested uBe by other firm# in the
industry. Yet the obvious solution may coroe
about: a running inventory of where all the cars
are. where each one is going, what's in it.
and who that belongs to. But, of course, that's
still in the works. Revolutionary ideas take time.
TWK65 feu MY IN iHto
Everywhere you go computers lurk. Yet
they wear so many faces it’s impossible to figure
what's going on.
Guidelines are hard to lay down here, but
if you look for examples of things you’ve already
run into in this book, it may help some.
Terminals you can presumably recognize.
Microprocessors are harder, because you
don't see them. Good rule-of-thumb: any device
which acts with complexity or apparent discretion
presumably incorporates a terminal, minicomputer
or microprocessor.
Two other things to watch for: transaction
systems and data base systems.
A transaction system is any system that
takes note of, and perhaps requires verification
of, transactions. Example: the new point-of-sale
systems (POS). This is what's about to replace
the cash register.
In the supermarket of the future, every
package will have a bar code on a sticker, or
printed on the wrapper. Instead of the checkout
clerk looking at the label and punching the a-
mount of the sale into the cash register— an
error-prone and cheat-prone technique which
requires considerable training-- your New Im¬
proved Checkout Clerk will wave a wand over
the bar code. The bar code will be sensed by
the wand, and transmitted to a control computer,
which will ring it up by amount and category
(for tax purposes), and even keep track of
inventory . noting each object as it is removed
from stock.
Here is what your bar code will look like.
(A circular code, which was already turning up
on some TV dinners, has been eliminated by the
bar code. This is unfortunate, since the scan¬
ner necessary to read the bar code is electron¬
ically more complicated, but there we are.)
(Incidentally, while this does arrest the
classic cashier's cheat-- ringing up excessive
purchases on the customers, then having a con¬
federate walk through equivalent amounts— the
consumer is still entirely prone to cheating by
the store in the computer program . Remember,
it's 1974. So you still may have to check your
tapes, folks.)
Data base systems are any systems which
keep track of a whole lot of stuff, often with
complex pointer techniques (see "Data Structures,"
P- ZG)- A cute example is the message service
now offered by Stuckey’s snack/souvenir stands
all over the country. You may leave messages
for your friends or loved ones on the road; they
can stop at any Stuckey's and ask for their
messages, just as if it was a telephone answering
service. (You're listed by your phone number—
is this to avoid pranks? And what about people
with no phones?) It’s free and a neat idea.
(Obviously, the messages are stored on the disk
of a big central computer, and queried from
terminals at the individual stands.)
The potential dangers of transaction systems
are fairly obvious from the supermarket example,
but they fan out in greater complexity as the
systems get more complex. Credit cards, for
instance, were only made possible by computers
and computerized credit verification; but it is
only now, fifteen or so years into the credit-card
era, that laws protect the cardholder against
unlimited liability if he loses it.
Yet we plunge ahead, and it is obvious why.
Transaction systems managed in, and by, com¬
puters allow more flexible and (in principle)
reliable operations. For instance, in the secu¬
rities business, thousands of stock certificates
are lost and mislaid, and the transaction paper
must be typed, shuffled, put in envelopes, sent,
opened, shuffled again, compared... all by hand.
Little wonder they're working on an Automated
Stock Exchange System. But if it's taken fifteen
years to get the implicit bugs out of credit cards
... not to mention the frequent allegations that
much Wall Street "inefficiency" is actually the
disguised marauding of Organized Crime...
uh-oh. (If they can buy the best lawyers, they
can probably buy the best programmers.)
Then there is the Checkless Society. This
is a catchphrase for an oft-advocated system that
allows you to transfer money instantly by compu¬
ter; supposedly some such thing is working al¬
ready in France. Again, they better get it pretty
safe before a sane man will go up in it.
The safety of such systems i9 of course
a matter of immense general concern. IBM
portentiously (sic) announced its intent to spend
millions of dollars on "computer security" a few
years ago. However, a few million dollars is
not going to plug the security holes in the IBM
360, and evidently the 370 is just about as vul¬
nerable.
(In this light, even the greatest IBM-haters
will have to admit that there may be a proper
motive behind IBM's current refusal to let others
use its new operating system language: that way
they may be able to prevent special holes in the
system from becoming known to programmers.)
It is interesting that one profession seems
to be stepping forward to try to improve this
situation: the auditing profession, devoted to
verification of financial situations of companies,
seems to be branching into the verification of
computer programs and the performance of com¬
plex systems. This will be great, if it works.
Cynics, however, may note that auditors have
permitted some remarkable practices in the
"creative" accounting of recent years. (Obvious¬
ly the way to check out the safety of big systems
is to offer bounty to those who can break its
security. But who is willing to subject a system
to a test like that?)
Hereabouts are a few other computerish
things you may run into which more or less
defy categorization.
\—V
THE COMPUTER GRAVEYARD
In the mid-3ixties there was a junkyard
in Kingston, N.Y. that was like an automobile
graveyard-- except piled high with dead com¬
puters.
They were from various manufacturers.
The guys would smash them with sledgehammers,
or other awful things, to make sure they could
never work again. Then you could buy the
circuit cards. I saw 1401s five high, Univac
File Computers, tape drives... it was an elec¬
tronic nut's paradise. You could decorate your
den with huge old control panels, mag disks
and whatnot. It seems to be gone now. They
forbade pictures.
should of course be called MATCHUP DATING,
since there is nothing particularly computerish
about either the process or its intended result.
But there we go again: word-magic, the impli¬
cit authority of invoking the word Computer.
(See "Cybercrud," p. J .)
In the early sixties, a perky young fella
at the Harvard B-School, I believe, one Jeff Tarr,
came up with the notion of a computerized dating
service. The result was Operation Match, an
immense financial success, which sort of came
and went. No followup studies were ever done
or success statistics gathered, unfortunately,
but they certainly had their fun.
The basic principle of "computer dating"
is perfectly straightforward. Applicants send in
descriptions of themselves and the prospective
dates they would like to meet. The computer
program simply does automatically the sorts of
thing you would do if you did this by hand:
it attempts to find the "best' 1 match betweeen
what everybody wants and what's on hand.
Obviously this could be a matter for
serious operations research: attempting to dis¬
cover the best matchup techniques among things
that never really fit together, detail for detail;
trying to find out, by followup questionnaires,
what trait-matchings seemed to produce the best
result, etc. But such serious matchup-function
research remains, so far as I know, to be even
begun.
Obviously there are several problems.
Demographically it is almost never true that
"for every man there's a woman"-- in every
age-bracket there's almost always an imbalance
of the opposite sex in the corresponding eligible
age-bracket, either too many or too few. But
more then that, there is little likelihood that
the traits women want are adequately represen¬
ted among the available males, or vice versa.
For introduction services it's obviously worse:
there is no balance likely between what comes
in one door and what comes in the other. The
service can only do its be3t with the available
pool of people-- and make believe it's somehow
made ideal by the use of the computer. It's
like an employment office: applicants don't
match openings.
Numerous other dating services have ap¬
peared, some of which don't even pretend to
use the computer (and others which claim to
be a registry for nonstandard sexual appetites)
but none that's gotten the attention of the orig¬
inal Project Match.
But there's no question who got the best
dates out of that one. Jeff Tarr.
—*-^
DO YOU GOT RHYTHM?
A device called the BIO-COMPUTER (trade
Now, moat of the big systems you run into
tend to be a combination of transaction and
data-base system. For instance, suppose you
make an airline reservation. The airline has a
Urge data base to keep track of: the inventory
of all thoae armchairs it 1 a flying around the
country, and the list of who so far have announced
plane to ait in them, and in some casea what
they intend to eat. When you buy your ticket,
that transaction then gets you put in the listing.
Same for car rentals and so on.
<oj)
1*- W.cm*
>0 (*j vyk
\ (p \—£~Dv
tioio ofem wr CK> r
mark) purportedly helps you predict your "body
beats," telling you what days are the right sort
of time to do particular things in terms' of your
own biological energies. The object coats $15
postpaid from BIO-COMPUTER. Dept. CLB/DM
(why not?), 964 Third Ave. , NY NY 10022.
The question with all such special purpose
devices— "fishing computers.” horse-racing
computers, etc., is always whether the theory
and formulas which are built into them are cor¬
rect. There is no ready way to tell.
63
One possibility, nice and expensive, is to
rent a number of mailing lists from a single
mailing-list house, with them guaranteeing that
they'll compare all the lists you choose and
not send to any person more than once.
But as you may be suspecting, this costs
money. All this screening and intercomparing
requires computer time, and so, even though
you are getting a more and more perfect mailing,
you are paying more and more and more money
for it. So you can see why reasonable business¬
men are willing to send out ads even when they
know some recipients will get several duplicates.
Another interesting point. There are
mailing lists for all kinds of different possible
customers. The possibilities are endless.
Minority-group doctors. People interested in
both stamp collecting and flowers (you’d have
to get a company with both lists, and have them
go through them for the duplicates ... you get
the idea).
Note that mailing lists are priced according
to their desirability. Weeded mailing lists, fea¬
turing only Live Ones, people who've ordered
big in recent times, are more expensive. Lists
of doctors, who buy a lot, .are more expensive
than lists of social workers. And so on.
Then there's the matter of the pitch.
The ad's phrasing may be built around
the mailing plan. Some circulars come right out
and tell the recipient he's going to get several
copies because he’s such a wonderful person.
THEN there are those advertisements that
are actually printed by the computer , or at least
certain lines are filled in with the recipient's
name and possibly some snazzy phrases to make
him think it's a personal letter. Who responds
to such things I don't know. My favorite was
the one-- I wish I could find it to include here
— that went something like
You'll really look swell, Mr. Nelson
walking down Main Street of New York
in your sharp-looking new slacks...
I don’t know whether I enjoyed the spaces or
the Main Street more.
But you see how this works. There's
this batch-processing program, see, and the
names and addresses are on one long tape, and
the tape goes through, and the program takes
one record (a name and address), and decides
whether to call the addressee "Mr.," "Ms." or
whatever, and then plugs his name into the
printout lines that give it That Personal Touch;
and then the mailing envelope or sticker is
printed; and the tape moves on to the next
record.
We may look forward to increasing en¬
croachments on our time and trust by the direct
mail industry: especially in better and better
quack letters that look as though they've really
been personally typed to you by a real human
being. (It is apparently legal for letters to be
signed by a fictitious person within a company.)
In the future we may expect such letters to be
sent on fine paper, typed individually on good
typewriters, and convincingly phrased to make
us think a real personal pitch is being tendered.
There is, however, a final solution.
Theodor H Nelson
458 U 20Th St
Nejf York, Ny 100 1 1
Great news! for thfNelson)f anily!
Houldn't ylu like your money to work for you full tine...
even when t°u*re asleep?
How Ison family can save...right -at their own
Passbook Savings Plan which
•ouarterly or even
^hm**** t tu e " a 'u
•V-
Dear Reader:
tio n and make you a highly-roted prespect for everything ^
from maK T’i' 1 n mut ual funds .__
you've undoubtedly -heard everything" by ^e »h y
of promises and premium. I won't try to top any of thee,.
If you subscribe to Wu .i,*. you won't get rich quick.
You won't bowl over friends and busu’^"
clever '
12=5 P ° nTL *~° COLORAOO 00300
ER, COLORAOO 80302 ^
0aar *r. Nel son :
ear, io° tn b Tl,is is "« an oral-
It can save you money off the r<JrTT? fferf ■ a aiaf 7 a zine.
won't appeal tif it per _
’ll ippeal to we think it
Because it
aives vou
YOU CAN GET OFF ALL MAILING LISTS
— that is, the ones "participating" in the
Association- - by writing to
Direct Mail Advertising Association
Public Relations Department
230 Park Avenue
New York, NY 10017
They will send a blank. If you fill it in
they’ll process it and delete your name from
mailing lists of all participating companies.
Presumably this won’t help with
X-rated or stamp-collecting lists, but It
ought to keep you from getting semiannual
gift catalogs from places like The House of
Go-Go Creative, Inc. and those million
solicitations from Consumer Reports and
that File Box company.
You call up the bank and ask your balance
and they say, "I’m afraid 1 can’t get that infor¬
mation. You see, it’s on a computer."
(See Basic Rejoinder, nearby.)
Well, the reason it's this way is that
they're handling things in Batch (see p.^S )
and they aren't storing your account on disk,
or if they are they don’t have a terminal they
can query it with.
But to say that they can’t get the infor¬
mation because it's on a computer is a typical
use of the computer as an excuse (see Cyber-
crud, p. $ ); and second, if the person be¬
lieves this to be an explanation, it's a sign of
the intimidation and obfuscation that have been
sown among the clerks who don't understand
computers.
Write them a letter. Change banka. Let’s
get the banks to put on more and more citizen
services. Rah!
62
)>MNwr
6*\roKK!
Everybody blames the computer.
People are encouraged to blame the
computer. The employees “of a firm, by
telling outside people that it's the
computer's fault, are encouraging public
apathy through private deceit. The pre¬
tense is that this thing, the computer,
is rigid and inhuman (see "The Myth of
the Computer," p. 7 ) and makes all
kinds of stupid mistakes.
Computers rarely make mistakes. If
the computing hardware makes a hardware
error in a billion operations, it may
be noticed and a repairman called. (Of
course, once in a billion operations is
once in a thousand seconds, or perhaps
every ten minutes. That ought to be
mentioned.) Anyhow, innocent gadgetry
is not what forces you to make stupid
multiple choices on bureaucratic forms;
mere equipment isn't what loses your
subscription records;
IT'S
THE
SYSTEM .
By system we mean the whole setup: the
computer, the accessories that have been
chosen for it, its plan of operation or
program, and the way files are kept and
complaints handled.
Don't blame the computer.
Blame the system; blame the program¬
mer; blame the procedures; best of all,
blame the company. Let them know you
will take your business to wherever they
have human beings. Same for governmental
agencies: write your congressman. And
so on.
4 V W
we should all practice and* have ready at the
tip of our tongues:
WHY THE HELL NOT? YOU'RE THE ONES WITH
THE COMPUTERS. NOT ME!
Let's froth up a little citizen indignation here.
In principle we no longer need account
numbers.
Now that text processing facilities are
available in moBt (if not all) major computer
languages, the only excuse for not using these
features is the programmer's notion of his own
convenience— not that of the outside customer
or victim.
Example . Someone I know got brand new
^■MsriH»4^aM*and credit
cards. He made no note of their numbers. Then
he lost them both. Duly he reported the losses.
Neither service could look him up . they said .
without the numbers . Not having used them, he
had no bills to check. Even though he was the
only person at that address with anything like
that name. And why not, pray tell? Either be¬
cause they were fibbing, or because they had
not seen fit to create a simple straightforward
program for the purpose. (See Basic Rejoinder,
nearby.)
I have heard of similar cases involving
major life insurance companies. Don't lose the
numbers . Let’s all dance to it:
When anything is issued to you,
Write the number down.
"CpHtoTOL!"
TH*TJ>0H
Few of us can help feeling outrage at
the book clubs, or subscription offices, or
billing departments, that don’t reply to our
letters. Or reply inappropriately , with a form
printout that doesn't match the problem.
First let's understand how this happens.
These outfits are based on using the com¬
puter to handle all correspondence and trans¬
actions. The "office” may not have any people
in it at all-- that is, people whose job it is
to understand and deal sensibly with the prob¬
lems of customers. Instead, there may just be
keypunch operators staffing a Batch System, set
up by someone who has long since moved on.
The point of a batch system (see p.fST)
is to save money and bother by handling every¬
thing in a controlled flow. This does not mean
in principle that things have to be rigid and
restrictive, but it usually means it in practice.
(See "The Punch Card Mentality," p. £<? .)
The system is set up with only a fixed number
of event types, and so only those events are
recognized as occurring. Most important, your
problem is assumed to be one that will be
straightened out in the course of the system’s
flow . While there may be provision for excep¬
tions-- one clerk, perhaps— your problem has
not seemed to him worthy of making an excep¬
tion for.
Here is my solution. It has worked
several times, particularly on book clubs that
ignored typed letters and kept billing me
incorrectly.
Get a roll of white shelf paper, two or
three feet wide and twenty or more feet long.
Write a letter on the shelf paper in magic
marker. Make it big, perhaps six inches to a
word. Legibility is necessary, but don't make
it too easy to read.
Explain the problem clearly.
Now take your punch card— you did get
one, didn't you, a bill or something?-- and
mutilate it carefully. Tear it in quarters, or
cut it into lace, or something. But make sure
the serial number is still legible . Staple it
lovingly to your nice big letter..
Now fold your letter, and find an envelope
big enough for it to fit in, and send it, regis¬
tered or certified mail, to ANY HUMAN BEING,
ACCOUNTING DEPARTMENT, or whatever, and
the company's address.
This really works quite well.
I am assuming here, now, that your prob¬
lem has merit, and you have been denied the
attention required to settle it. If we want justice
we must ourselves be just.
There is one further step, but, again, to
be used only in proportion to the offense. This
step is to be used only if a meritorious commun¬
ication, like that already described, has not
been properly responded to in a decent interval.
We assume that this unjust firm has sent
you a reply envelope or card on which they
must pay postage. Now carefully drafting a
follow-up letter, explain once again, in civil
language, the original problem, your efforts
at attention, and so on. Now put it in a package
with a ten or twelve-pound rock, affix the
reply envelope to the outside, and send it off.
The problem, you see. has been to get
out of the batch stream and be treated as an
exception . Flagrantly destroying the punch card
serves to remove you from the flow in that fash¬
ion. (However, just tearing it a little bit prob¬
ably won't: a card that is intact but torn can
simply be put in a certain slot of the card-punch
and duplicated . Destroy it good and plenty.)
In all these cases remember: the problem
is not that you are "being treated as a number,"
whatever that means, but that your case does
not correctly fall in the categories that have
been set up for it. By forcing attention to your
case as an exception, you are making them
realize that more categories are needed, or more
people to handle exceptions. If more people do
this when they have a just complaint, service
will improve rapidly.
mi
The people who send it out like to call it
personalized advertising and the like. But most
of us call it Junk Mail. And its vagaries are
NOT THE POOR COMPUTER'S FAULT. What gets
people angry derives from the system built
around the poor computer.
You may wonder why you get more and
more seed catalogs, or gift-house catalogs, as
time goes on, even though you never order any¬
thing from them. Or why a deceased member
of the household goes on getting mail year
in and year out, regardless of your angry post¬
cards .
How does it keep coming?
Through the magic of something called the
Mailing List.
And especially the peculiar way that
mailing lists are bought and sold .
THE rUMUL « 01YM
Now, a mailing list is a series of names
and addresses of possible customers. stored on
computer tape or disk.
You can buy the use of a mailing list .
But you cannot buy the mailing list itself.
Suppose you have a brochure advertising
pumpkin-seed relish, which you suggest has
rejuvenating powers. You want this brochure
to go out to rich college graduates.
You go to a mailing-list house.
"I cannot sell you this mailing list out¬
right," says the jolly proprietor, "for it is my
business to sell its use again and again, so
1 do not want anybody else to have a copy of
it.” So you leave 2500 pumpkin-seed relish
brochures with the mailing list company. and
pay them a lot of money. And they swear on
a stack of bibles that they have mailed the bro¬
chures to their special list of rich college grad¬
uates .
Well, let's say you get 250 sales from
that mailing. (10% is fantastically good.) But
out of curiosity you go to another mailing-list
house and have another mailing sent out-- this
one to people who have low incomes and little
education.
This time you get 15% orders.
Now guess what you are acquiring.
A mailing list of your very own. Of peo¬
ple who eat pumpkin-seed relish.
Mailing lists are, you see, generally ren¬
ted blind, with no chance to see the addressees
or check as to whether they've already been
mailed to.
And that explains all the duplications.
If an advertiser is going after a certain
type of customer, and goes to several mailing-
list houses asking for mailings to that particular
type of customer, chances are some people will
be on several of the lists. And since there’s
no way to intercompare the lists, these poor
guys get several copies of the mailing.
(Another way this can happen is if some
cheapskate has his own mailing Hat and doesn't
check it for repeats of the same name. But
writing the computer program to check for
repeats of the same name is not easy-- there
might just be a Robert Jones and a Rob Jones
at the same address-- and these things are not
usually checked manually. They're big.)
Another possibility exists for eliminating
duplications when you rent mailing lists. You
can bring in a magnetic tape with your mailing
list on it, and they can send out the mailing
only to the members of their list who are not
already on your list. That way you still can't
steal their list, since the tape is on their
premises. The trouble is, they can steal your
list, by making a copy of the tape. Oh dear.
61
From all this, one last speculation creeps
forward.
Ivan Sutherland, in considering the struc¬
ture of subroutining display processors, has
noted that as you get more and more sophisti¬
cated in the design of a display program fol¬
lower, you come full circle and make it a full-
fledged computer, with branch, test, and arith¬
metic operations.
If the somatic mechanism should turn out
to have a program follower as described, it is
not much of a step to suppose that it might have
the traits of an actual computer, i.e., the ability
to follow programs, branch. and perform manip¬
ulations on data bearing on those operations.
In other words, the digital computer may
actually have been invented long before von
Neumann, and we may have billions of them
on our persons already.
It may sound far-fetched, but the mechan¬
isms elucidated at this level are so far-fetched
already that this hardly seems ridiculous.
THE COMPUTER FRONTIER
Regardless of what’s actually in the cell,
it is clear that being able to adapt molecular
chemistry, especially DNA and RNA, to computer
■torage is a beckoning computer frontier.
This would make possible computer mem¬
ories which are far larger and cheaper than
any we now have.
Basically we can separate this into two
aspects:
The DNA Readout. This part of the sys¬
tem would create long molecules holding digital
information.
The DNA Readin. This would convert it
back to electrical form again.
Weird possibilities follow. One is that
(if chemical memory is generic, rather than
idiosyncratic to an individual's neural pathways)
knowledge could be set up somehow in "learned"
DNA form, whatever that might turn out to be,
and injected or implanted rather than taught .
Weird.
As our ability to create clones improves,
we could clone new creatures, or genetic "im¬
provements"-- which, considering the racehorse
and the Pekinese, means "those sorts of non-
viable modifications supported in human society."
And of course that ghastly stuff about building
humanB, or semi-humans; having traits that
somebody or some organization, ulp, thinks is
desirable...
But the real zingef is this one. It might
JuBt be a small accidental printout meant to
teat the facility, or maybe just a program bug—
— but the system could output a virus
that would destroy mankind.
BIBLIOGRAPHY
James D. Watson, Molecular Biology of the Gene.
Beautifully written; meant for highschool
science teachers. But potentially formi¬
dable; if bo, start with his autobiographical
The Double Helix, which is a gas.
Mark Ptashne and Walter Gilbert, "Genetic
Repressors." Scientif ic American , June
1970, 36-44.
S.E. Luria, Life : The Unfinishe d Experiment .
Scribner's.
Lewis Thomas, The Lives of a Cell . Viking, $7.
Eloquent writing to popularize, among
other things, the New Cenetic view that
your modern animal cells, and mine, ac¬
tually contain various fungi and other
atrey ding-a-llngs that slid into one of
our ancestors and found useful work, join¬
ing the basic genetic program.
It used to be fashionable to say,
"The brain ia a computer."
But now people say, "The brain
is a hologram."
It BfafJ
Almost nothing is known about the brain.
Oh, there are lots of picture-books showing
cross-sections of brains... Maybe you thought
it was just a big cauliflower, but it's full of
strings and straps and lumps and hardly any¬
thing ia known about any of it.
Clinical evidence, of course, tells us
that if this or that part is cut out, the patient
can't talk, or walk, or smell, or whatever.
But that doesn't come close to telling us how the
thing works when it does work. The histologists,
the perceptual psychologists, the anatomistB,
are all working at it— with no convergence.
Beautiful example: the split-brain stuff, which
I just better not even bring up here (see new
Maya Pines book, Harcourt Brace).
We used to dissect brains when I worked
down in Dr. Lilly'B dolphin lab. Dolphin brains
are about 1.2 times the size of ours, and Lilly
quite reasonably pointed out that this might mean
dolphins were smarter than us.
And. of course, the bigger whales even
smarter. We had a killer-whale brain in the
deepfreeze that was about 2i feet across . And
whales come much bigger than that; the Killer's
maybe a quarter the length of the Blue.
(I should point out here that Lilly’s pub¬
licity on the intelligence of dolphins was a little
too good: it somehow didn't get mentioned that
dolphins are just very small whales , the only
ones you can feasibly keep in a lab. So think
of whales as the possible super-smarties, not
just dolphins.}
What's that you say? That "brain size
isn't what counts"? That's an interesting point.
People with small heads are by and large
just as smart as people with big heads. That's
one argument.
However, people have much bigger brains
than almost any other animals. That indicates
something too.
I believe that the only other animals with
very big brains are elephants and whales. (An
anatomical explanation: the weight is supported
on the man by balancing it, on the elephant by
a heavy and comparatively inflexible neck offset
by a grappling tool, and in the whale by putting
it in the front of a torpedo. But most other
anatomies couldn't manage a big brain, so they
can’t evolve one.^
Anyhow, so the scientific question is
whether big-brained species are smart. Well,
dogs are smarter than rats. . .
But about these other guys in our league
and beyond. How do we know scientifically
that "the size of the brain isn't what counts"?
Because obviously they’re not as smart as we
are, people say. Therefore it isn't brain size
that counts. The depth of this logic should be
evident. (I've even heard people say, "Of course
they're not as smart. They don't have guns.")
Pay close attention to an elephant sometime.
Working elephants in India respond to some
500 different oral commands.
Can you think of a 501st thing to ask an
elephant to do? (I rather suppose it could oblige.)
Anyway, the dozen whales I've known per¬
sonally were smart as hell.
It used to be believed that memory was
exclusively a matter of synaptic connections--
the gradual closing of little switches between
nerve cells with practice.
It is now known that temporary or
short-term memory is synaptic, but something
else takes place after that. It's believed that
after a certain period, and it has something
to do with rest and sleep, memories are trans¬
ferred to some other form, presumably chemical.
But how?
My friend Andrew J. Singer has a beau¬
tiful hypothesis that wraps it up. His gueas
is that memories are moved from synaptic
storage to DNA (!) storage during dreaming ,
or more specifically REM sleep. I like that one.
WH^T NtXT?
By browsing this book you may have more
sense of what computers are doing, can do,
should do.
What will you do now?
By reading this book in some detail, es¬
pecially that difficult machine-language stuff (see
"Rock Bottom" and "Bucky’s Wristwatch," pp.
32)• or the pieces on specific computer
languages Cpp - >. you really should be
mentally prepared to get into programming, if
you dig it.
Maybe you should consider buying your
own minicomputer, for a couple of thousand. Or
(if you're a parent), chipping in with several
families to get one. Or a terminal, and buying
(or cadging as cadge can) time on a time-sharing
system. Maybe you should start a computer club,
which makes it easier to get cast-off equipment;
if you're kids, write the R.E.S.J.S.T.O.R.S. (p.
f7). If you have a chance, maybe you should
take computer courses, but remember the slant
these are likely to have. Or perhaps you prefer
just to sit and wait, and be prepared to speak up
sharply if the computer people arrive ready to
push you around. Remember:
COMPUTER POWER TO THE PEOPLE!
DOWN WITH CYBERCRUD!
Computers could do all kinds of things for
individuals , if only the programs were available.
For instance: help you calculate your tax inter¬
actively till it comes out best; help the harried
credit-card holder with bill-paying by allowing
him to try out different payments to different
creditors till he settles on the month's best mix,
then typing the checkB; WRITING ANGRY LETTERS
BACK to those companies that write you nasty
letters by computer; helping with letter-writing
in general. You’ll have to write the programs.
How do you think computers can help
the world?
What are you waiting for?
THE COPPER MAN WALKED OUT OF THE ROCKY CAVERN
Fashions change.
&
The ttlTiejr Ontora^?
The focus of attention in genetics and
organic chemistry has for a decade now been
the remarkable systems and structures of the
molecules of life, DNA and RNA.
DNA is the basic molecule of life, a long
and tiny strand of encoded information. Actually
it is a digital memory, a stored representation
of codes necessary to sustain, reproduce, and
even duplicate the creature around it.
It is literally and exactly a digital memory.
Its symbols are not binary but quaternary , as
each position contains one of four code molecules;
however, as it takes three molecules in a row to
make up one individual codon, or functioning
symbol, the actual number or possible symbols
is 64-- the number of possible combinations of
four~different symbols in a row of three. (I don't
know the adjective for sixtyfourishneBS, and it’s
just as well.)
The basic mechanism of the system was
worked out by Francis Crick and dames Watson,
who understandably got the Nobel Prize for it.
The problem was thia: how could living cells
transmit their overall plans to the cells they
split into? — and how could these plans be
carried out by a mechanical process?
The mechanism is astonishingly elegant.
Basically there is one long molecule, the DNA
molecule, which is really a long tape recording
of all the information required to perpetuate
the organism and reproduce it. This is a
long helix (or corkscrew), as Linus Pauling
had guessed years before. The chemical pro¬
cesses permit the helix to be duplicated, to
become two stitched-together corkscrews, and
then for them to come apart , unwinding to go
their separate ways to daughter cell6.
As a tape recording, the molecule directs
the creation of chemicals and other cells by an
intricate series of processes, not well understood.
Basically, though, the information on the basic
DNA tape is transferred to a new tape, an active
copy called "messenger RNA," which be¬
comes an actual playback device for the
creation of new molecules according to
the plan stored on the original.
Some things are known about this process
and some aren't, and I may have this wrong,
but basically the DNA-- and its converted copy,
the RNA-- contain plans for making all the
basic protein molecules of the body, and anything
else that can be made with amino acids. (Those
molecules of the body which are not proteins or
built of amino acids are later made in chemical
processes brought about by these kinds.)
Now well may you ask how this long tape
recording makes chemical molecules. The answer,
so far as is known, is extremely puzzling.
As already mentioned, the basic code
molecules (or nitrogenous bases ) are arranged
in groups of three. When the RNA is turned
on. these triples latch onto the molecules of
amino acid that happen to be floating by in the
aoupy interior of the cell. (There are twenty--
seven amino acids, and sixty-four possible
combinations of three bases; this is fine, because
several different codons of three bases can glom
onto the same passing amino acid.)
Now. the tape recording it divided into
separate sections or templates ; and each template
does its own thing. When a template is filled,
the string of amino acids in that section separate,
and the long chain that results is a particular
molecule of significance in some aspect of the
critter's life processes— often a grand long
thing that folds u|> in a certain way, exposing
only certain active surfaces to the ongoing
chemistry of the cell.
One theory about the mechanics of this is
that a sort of zipper slide, called the ribo some,
chugs down the tape, attaching the called-for
amino acida and peeling off the ever-longer result.
V
9
Now, here are some of the funny things
that are known about this. One is that there is
a particular codon of three bases that is a stop
code , just like a period in ordinary punctuation.
This signals the end of a template. Another ia
that the templates on the tape are in no partic¬
ular order , but distributed higgledy-piggledy.
(Geneticists engaged in mapping the genes of a
particular species of creature find that the gene
for eye color may turn out to be right next to
the gene for length of tail-- but where those
are really . and what the particular molecules do
that determine it, are still mysterious sorts of
question.)
Much pressing research in molecular bio¬
logy, then, is concerned with searching for
whatever it is that switches different things on
and off at different times in the careers of the
ever-splitting cells of our bodies. Not to men¬
tion those of all other living creatures, including
turnips.
COMPUTERISH CONJECTURES
The guy8 who specialize in this are usually
chemists, and presumably know what they're
doing, so the following remarks are not intended
as butting into chemistry. However, new per¬
spectives often give fresh insight; and the matters
we've covered so far might seem to have a cer¬
tain relevance.
DNA and RNA, as already remarked, may
without distortion be thought of as a tape . Indeed,
on this tape is a data structure, and indeed it is
a data structure which seems to be involved with
the execution of a program -- the program that
occurs as the organism's cells differentiate.
There is evidently some sort of program
follower which is capable of branching to dif¬
ferent selections of (or subprograms ) in the
overall program, depending on various factors
in the cell's environment-- or perhaps its age.
Now, it is one thing to look for the par¬
ticular chemical mechanisms that handle this.
That's fine. On the other hand, we can also
consider (from the top down) what sort of a
program follower it must be to behave like this.
(This is like the difference between tracing out
particular circuitry and trying to figure out
the structure of a program from how it behaves.)
Here is some more weird stuff about this.
Large sections of the DNA strand are "dark,"
it turns out, just meaningless stretches of random
combinations of bases that don’t mean anything—
or ever get used. This ties in, of course, with
the notion that genetic change is random and
blind; the general supposition is that genetic
mutation takes place a base or two at a time,
and then something else activates a chance com¬
bination in a dry stretch that turns out to be
useful, and this is somehow perfected through
successive 1-base changes during the process
of successive mutation and evolution.
Amazing use is made of these mechanisms
by some viruses. Now, viruses are often thought
of as the most basic form of life, but actually
they are usually dependent on some other form
and hence more streamlined than elemental. Well,
some viruses (but not all) have the capacity for
inserting themselves in the genetic material:
breezing up to the DNA or RNA. unhooking it in
a certain place and lying down there, then being
duplicated as part of th£ template , then unhooking
themselves and toddling away-- both parent virus
and copy. I can’t for the life of me think of an
analogy to this, but I keep visualizing it as hap¬
pening somehow in a Bugs Bunny cartoon.
CONTROL MECHANISMS
Now, all cells are not alike. From the first
beginning cell of the organism (the zygote), various
splits create more and more specialized, differ¬
entiated cells. A liver cell is extremely different
from a brain cell, but they both date back by
successive splitting from that first zygote. Yet
they have different structures and manufacture
different chemicals.
One simplification may be possible: the
"structure" of a cell may really be its chemical
composition, since cell walls and other struc¬
tures are thought to be special knittings of
certain tricky molecules. Okay, so that may
reduce the question slightly. How then does
the cell change from being an Original (undif¬
ferentiated, zygotic) cell to the Specialized
cells that manufacture particular other complex
chemicals?
One hypothesis was that these other cells
have different plans in them, different tapes.
But this theory was discarded when John Gurdon
at Oxford produced a fresh frog zygote from the
intestinal cell of a frog (which accordingly, in
due time, became a frog de facto ). This proved,
most think, that the whole tape is in every cell.
Thua there must be something-or-other
that blocks the different templates at different
times (You there, now you're a full-fledged epi¬
thelial cell, never mind what you did before)
and selects among all the subprograms on the tape.
At any rate, the following interesting con¬
jectures arise:
1. The mechanism of somatic reproduction is
a subroutining p rogram follower— not unlike
the second program follower of the subroutining
display (see p. That is, it steps very
slowly through a master program somewhere,
and with each new step directs the blocking or
unblocking of particular stretches of the tape.
As the program is in each cell, presumably
it is being separately followed in each cell.
(This is sometimes called distributed computing .)
2. In each cell, the master program is direc¬
ting certain tests , whose results may or may not
command program branching- - successive steps
to new states of the overall program. It may
be testing for particular chemical secretions in
its environment; it could even be testing a counter .
3. (This is the steep one.) If this were so,
we might suppose that this program too was stored
on the DNA, in one or more program areas; and
it would therefore be necessary to postulate some
addressing mechanism by which the program fol¬
lower can find the templates to open and close.
(And perhaps further sections of the program.)
4. Indeed, it makes sense to suppose that
such a program has the form of a dispatch table
--a list of addresses In the tape, perhaps asso¬
ciated with specifications of the tests which a're
to cause the branching.
A
(or
These wild speculations are offered in the
spirit of interdisciplinary good fellowship and
good clean fun. Whether (1) and (2) have any
actual content, or are merely paraphrases of
what Is already known or disproven, I don’t
know; somebody may find the rest suggestive.
Two more observations, though. These
are not particularly deep, and may indeed be
obvious, but they suggest an approach.
5. There ia definitely a Program Restart; to wit,
whatever it ia that turns an old differentiated
intestine cell into a fresh zygote.
6. Cancer is a runaway subroutine.
Tha above remarks aeea to be obsolete. The genetic mechanise really lent to be a Hat processor (see p.
using anocUtlvt, rather than numerical addressing. Th* gene Is now thought to be divided into four segments,
fn . kyi- called Promoter, Initiator, gene proper, end Terminator. As I understand
SJ' It, the promoter and terminator sonee contain codas which mean, simply,
J ' I Start and Stop. The Initiator zone, however, la a coded segment which ef-
* fsctivel yflabela the gene. This Initiator area contains a chemical code uni¬
que for every gene. Ae suggested In the above article, we may consider both Its logical structure— Its mech-
anlsas and effacts, considered from a computerssn'■ point of view-- and its chemical structure, or what is
raally happening. The genes ere turned off by grabbing molecules, or repressors , which glom onto the initiator^—+)
sect Ions of the genes which they have bean specifically coded to repress. Research In this area must now find " '
the specific coding of molecules which block and unblock specific genes, and how these fit In the overall graph
of metabolism, immunology, development, and ao on. If there la anything to make an old atheist uneasy, it la
tha extraordinary beauty of thia clockwork.
BIBLIOGRAPHY (f>T
Har Gobind Khorana, Willard Gibbs lecture. May 1974 ,
"Progress in the Total Synthesis of the p-ro-
sina tmtAGene and Its Control Elements."
4 f^VlWSLY
Not all kid* who play with computara irt
quit* a* law-abiding aa tha R.E .8.1.S .T.O.R.S.
And tha temptation* ara vary alronf.
On# auch youngster want on a Mghaehool
fUld-trlp to a auburhan Philadelphia polio#
atalion. and aaw a demonatratlon of the polio#
ramota Information ayatem
Tha polio# who war* demonatrating it,
not being oomputar fraake, didn't reallaa how
simple it waa to obaerva th# dial-in number#,
paaaword* and protocol.
Whan thia lad got home, he merrily went
to hi* computer terminal in the baaement and
proceeded to enter Into Philadelphia'a liai of
moat-wanted criminal* th* name* of all hi*
A few day* later a man came to hla houae
from th# FBI. He waa evidently not a regular
operative but a technical type. He aaked very
nicely If the boy had a terminal. Then the FBI
man aaked very nicely If he had put in thaae
name*. The boy edmltted. grinning, that he
had (Everyone In the aohool knew it had to
be he.)
"Of courae it didn't do any harm.” aaya
tha culprit. "I had them down for crimes UXe
'intellectual murder.' What could happen to them
PHILADELPHIANS AND CROOKS PLEASE NOTE:
Thia happened five or all year* ago, and
without a doubt the ayatem la by now totally eecut
and impenetrable. Let'ahope.
louseHf Redoes ••
Atyse ih foiMT
The question of "privacy” in the aba tract
ian't really an laaue. Who carea if Cod aeea
under your clothe*’ Th* problem 1* what hap¬
pen* to you on the beat* of people'* acceaa to
your record*.
M>. St. Jamee i* a celebrated weal coast
proatltuta, once well known for her activities
with Paul Kraaaner as "The Realist Nun;” she
la now Chalt-madam of an organisation called
COYOTE, campaigning for the decriminalization
of prostitution.
She originally had no intention of becom¬
ing a prostitute. Rather, she learned that
there waa a false record of her arrest for pros¬
titution; and despite her efforts to dear her
name, the record followed her wherever she
tried to get a job. Finally she said the hall
with It and did become a prostitute.
SLACt
hHV h$j> ml eve*.
The phone eyetem is bruised and bleeding
from the depredations of people who hive found
out how to cheat the phone company electronical¬
ly. Such people are called Phone Freaks (or
Phreax): articles on them have appeared in auch
place* aa Rampart* . The Realist and Out. For
no clear reason, the electronic devices they use
have been given various colorful names:
blkck box: device which. attached to a
local telephone, permits It to receive
an incoming call without billing the
calling party; it "look* like” the
phone is still ringing, as far aa the
billing mechanism la concerned.
b |ua box; device that generate* the magical
"inside" lone* that open up the phone
network and atop the billing median-
iam. Pose**Ion of a blue box can
put you in prison .
Aa with ao many things, th*
phone ayatem waa not dealgned under
the aaaumption that there would be
tbouaanda af electronic wlae-guy*
capable of fooling around with tl.
Thu* the phone system is tragically
vulnerable to such meaalng around.
The only thing they can do 1# gat
ferocious laws paaaed and really try
to catch people, both of which are
apparently happening. Buppoaediy
It la lilagal to possess a ton# gener¬
ator. or to inform anyone aa to what
th* magical frequencies are-- even
though a slid* whistle t* auch a
tone generator, and any engineering
rml box: device that simulate* the signals
mad* by falling coins.
Th# fact that th* name* of these davlcwe
•re given her* is not lo be construed a* In any
aenae approving of tham. and anybody who
me**** around with them la a fool, playing with
napalm.
Evan if people were entitled to steal beck
profit* from th* phone oompany - - the
•o-called "people's discount"-- tha trouble I*
that they meaa thing* up for evaryon*. W* have
a beautiful and deUcata phone ayatem, on* that
•tend* reedy to do wonderful things for you.
Including bring uompular aervlc# to your home;
even if. for th* sake of argument. It la run by
dirty rata, massing around with It la Ilk* poi¬
soning tha reservoir for everybody.
■bUTA "
The term "data bank" doesn't have
any particular technical weaning, rt
Just refers to any large store of infor¬
mation, especially something attached to
a computer.
For instance, at Dartmouth College,
where the social scientists have been
working hand-in-hand with their big tine-
sharing project, an awesone anount of data
is already available on-line in the social
sciences. The last census, for instance,
in detailed and undigested fora, Suppose
you're at Dartnouth and you get into an
argument over whether, say, divorced women
earn as much on the average as women the
sane age who havd never been married.
To solve; you just go to the nearest terminal,
bat in a quick program in BASIC, and the
system actually re-analyzes the census data
to answer your question. If only Congress
had this!
Because of the way census data is hand¬
led, now, it is not possible to ask for the
records of a specific individual. But this
kind of capability leads to some real dangers
There is a lot of information stored
about most individuals in this country.
Credit information, arrest records, medical
and psychiatric files, drivers' licenses,
military service records, and so on.
Now, it is not hard to find out about
an individual. A few phone calls from an
official-50unding person can ascertain his
credit rating, for instance. But that is
very different from putting all these re¬
cords together in one place.
The potential for mischief lies in
danger to individuals. Persons up to no
good could carefully investigate someone
through the computer and then burglarize
or kidnap. Someone unscrupulous could
look for rich widows with 30-year-old un¬
married daughters. Organized crime could
search for patsies and strong-arm victims.
In the face of this sort of possi¬
bility, computer people have been worry¬
ing for years; noteworthy is the study
by Alan Westin that originally sounded
the alarm, and his too-reassuring follow¬
up study of some data-gathering organ¬
izations (see bibliography). But the
scary data banks, the ones that evidently
keep track of political dissenters,
aren't talking about what they do (see
Schwartz piece).
Basically, the two greatest dangers
from data banks are organized crime and
the Executive branch of the Federal Gov¬
ernment-- assuming there is still a dis¬
tinction. -
"And th# rocket'# red glare,
D«e bomb# bunting in air,
Oaoe proof through the night
That our flag one at ill than*.
had had control ovi
national data bank:
Enough said.
he is concerned about computers and the
privacy problem. Cynics may joke about
what his concern actually is; but a more
credible stand was taken by vice-presi¬
dent Ford at the 1974 National Computer
Conference. Ford expressed personal
concern over privacy, particularly consid¬
ering a proposed system called FEDNET,
which would supposedly centralize govern¬
ment records of a broad variety.
Not mentioned by Ford was the matter
of NCIC, the National Crime Information
Center. This will be a system, run by
the FBI, to give police anywhere in the
country access to centralized records.
THE QUESTION IS WHAT GETS STORED. Ar¬
rest records? Anonymous tips? (It would
be possible to frame individuals rather
nicely if a lot of loose stuff could be
slipped into the file.)
Many people seen to be concerned
with preserving some "right to privacy,"
which is certainly a very nice idea, but
it isn't in the Constitution; getting
such a "right" formalized and agreed upon
is going to be no small matter.
But that isn't what bothers me.
Considering recent events, and the char¬
acter of certain elected officials whole
devotion to, and conception of, democracy
is lately in doubt, things' are scarcely
as abstract as all that. Considering how
helpful our government has been to brutal
regimes abroad-- notably the Chile over¬
throw, which some say was run from here
(and which used sports arenas for deten¬
tion just as John Hitchell did--) we can
no longer know what use any information
may find in this government. Tomorrow's
Data Bank may be next week's Enemies List,
next month's Protective Custodial Advis¬
ory-- and next year’s Termination List.
(I don't know if you saw Robert Hardian's
eyes on the Watergate hearings, but they
chilled my blood.)
Ita name ha* kapt changing, possibly
to lull th# public, possibly to gull th*
Congrass. Anyhow, would you believe a
system, totally controlled by ccwputers,
dealgned to shoot down oncoming mlaallaa?
If you would, read on.
It'* been called Nike-X, Safeguard
and goodnaa* knows what. lit'* even bean
called a "thin ahleld"— masculine, huh?
Perhaps Congress would pay more if they
called it th* Trojan 4X.) But generally
w* refer to It a* the ABK {Antl-Balliatic
tractor. They're th* mar
of the telephone company.
Of the hundredi of milltor
they ere taking in on thl
r H. David, "Computers. Privacy, and Sacu-
ttj •" Computer Declelona , Hay 7*. 46-A8.
. Wsetin, Privacy and Freedom . 1947.
cord-tMpm, and Prlv
■ landmark study of Compute
Completed.” CACM, De
which make* the computer*
which guide* th* project,
Whippany, N.J. facility 1
drawing only on Information that 1* pub¬
licly available, and drawing conclusion*
from It th* way on* usually draw* conclu-
Tha radar latagea axe forever con¬
stantly analysed ly coaqjuter*. using
avary trick of Pattern Recognition (*e
p. D*l'2ri-
Yea, ye*. I’m quit# sure now, aaya
phallic shape axlaee. It haa jagged an¬
gular fins, inherited from the smaller
antl-eircraft Hike (we say Hikay) rockets
that preceded It. Thia missile la celled
tha Spartan.
ir system la tracking tha
is Spartan la turning,
1 faster— they're coming
Oncoming missile speedi maybe 15,000
mil** an hour. Spartan speed> maybe
10,000, who know*. In the** few minute*
the Spartan ha* gone *00 miles.
the attacking missile, the hope 1
the attacking mlaalla'e tharmonuc
warhead will gat heated on one el
just breaks a few buildings and a
realise that tha bad guy has gotta
through, up goes Sprint: Sprint i
quently celled tha "terminal dafan
system." it only ha* a couple of
d thl* description alnd-
* because It la. Anybody
at thia project, on which
r dollars haw* already
Evan if missile* atayad Ilka they
were in the good old days of 1942 , big
helpless clunker# they had to fuel up
just before th* ahoot, th# likelihood of
th* 5-mil# AM detonation they count on
was pretty low. (Supposedly ARPA waa
hoping that Spartan and Sprint could be
replaced with ultrapower, fry-in-the-sky
laser beam*, rapping down all caawre
But even given, and only for th*
eak* of argument, the feasibility of
Spartan-Sprint for flsh-ln-a-barrel
ehota, look what's happening now.
HIHV (Multiple Independently Tar¬
geted Re-entry Vehicle) basically means
Multiple Warheads. On* rocket can carry
all these little guys, see, that fan out
when it gat* near the target, and each
on* goes to its own target city or instal
latlon. ros, or Fractional Orbital he-
bardment system, juat means that they
send the thing into an orbit around the
world, and tb* warheads comm in from the
opposite aid*. An£ side. Meaning that
all those radars pointed *t Russia would
make good drive-in movie screens.
one wonders how such things could ever
be funded. But then again I remember
once hearing Eric Sevareld, whom some
call a liberal, pontificate on this sub¬
ject. “They describe it aa a 'thin
shield,'(he said) Why can't wa just
spend a few billion more and get collate
protection?" otherwise canny people, if
fooled by the technologists, will believe
anything.
"Garfield, our people in Operat
11, I guess It would have to be..."
ae aa Vietnam. "Gee whir, they say to
arch and destroy, I guess that aaut
an..." Something new, this, the top-
en project of th# worst sort, where
b orders go down, and only news of
Th# sophisticated argument la that
the ABM effort lets our nation "keep ita
hand In," "sharpen skill*,’ in case some¬
thing vaguely like this la ever really
needed— and possible. But thl* overlooks
the overall strategic problM. All this
foolishness lead* away (icm the stability
of tha daterrene> and that may be what
kaapa everybody alive.
Hay II, 120-12*.
■polar System* end th* tseua of
v Par Away la 191*1" Deiamet loo . KtTL, ^t).
58
la an Imposing term which means almost anything.
Basically, "simulation" means any activity that
represents or resembles something Computer
simulation is using the computer to mimic some¬
thing real, or something that might be. tor any
purpose; to underetand an ongoing process battar,
or to see how something might come out in the
Hero again. though. the Science myth etepa
in to mystify this proceaa, as though the mere
uee of the computer conferred validity or some
kind of truth.
(On TV allows the Space Voyagers stand
In front of the "computer" and ask in firm, unnat¬
urally loud voices whit will be the results of so-
and-so. The computer's oracular reply ie infal¬
lible. On TV.)
Let there be no mystery about this. Any
use of a data structure on a what-if basis la
Simulation. You can simulate In detail or crudely;
your simulation can embody any theories, sensible
or stupid; and your results may or may not cor¬
respond to reality .
A "computer prediction" Is the outcome of
a simulation that someone, evidently, is willing
to stand behind. (Bee "computer election predic¬
tions." p. 6C.)
These polnte have to be etreased because
If there is one computer activity which la preten¬
tiously presented and streased, it ia simulation.
Especially to naive clients. There is nothing
wrong with simulation but there is nothing super¬
natural about it either.
Another term which means more or less
the same ia modelling .
In the loose sense, simulation or model¬
ling consists of calculstions sboul any dea-
crtbable phoenomena-- for instance, optical
equations. In optica] modelling (and this Is how
they design today's great lenses), a data struc¬
ture ia created which represent* the curvature,
mounting, etc. of the separate glasses In a lens.
Then "simulating" the patha of individual rays
of light through that lens, the computer program
teats that lens design for how well Ihe ray#
come together, and ao on. Then the design ia
changed and tried again.
Another type of simulation, an important
and quite diatinct one-- la that which represent*
Ihe complex Interplay of myriad units, finding
out the upshots and consequences of intricate
premises. In traffic simulations, for Instance,
II ia easy enough to represent thousands of cars
in a data structure, and have them "react"
like driver*-- creating very convincing traffic
Jams, again represented somehow within the
data structure.
Basically simulation requires two things;
a representation. or data structure, that somehow
represents the things you're simulating in the
aspects that concern you; and then a program
does something to these data, that is in some
way like the process you're concerned about
acting on the things you're modelling. And each
event of significance enacted by the program
must somehow leave its trice in the data structure.
The line between simulation and other pro¬
gramming ia not alwaya clear. Thu# the calcu¬
lation of the future orbits of the planets could be
called "simulations."
The moat intricate ceaea, though, don’t
particularly reaemble any other kinds of programs.
The intricate enactments of physical movements,
especially swarms and myriads with mixed and
colliding populations, are especially Interesting.
On a recent Scientific American article, alrnula-
tion helped to understand possible streamers
of stars between gslaxies as resulting from nor¬
mal considerations of Inertia and gravitation.
CAUr and Juri Toomre. "Violent Tides between
Gslaxies,’ Sri. Am. Dec 73, 38-48.))
Models of complex end changing rates are
another Interesting type. Enectlng complex
thing*, whose amount* are constantly changing
In term* of percentage multiplier* of each other,
•ound easy in principle, but their consequences
can be quite aurprlaing. (See "The Club of
Rome," p. 4f .)
To Imagine the kinds of mixed-case myriad
modal* now possible, we could on today's big
computers model entire societies, with a separata
record describing each Idlvldual out of million*,
and specifying hla probebilities of action and
different preference* according to various theories
then follow through whole societies' behavior
in terras of education, income, marriage, sex
poverty, death, and anything else. Talk about
tin soldier* and boats In the bathtub.
Any computer language can be used for
some kind of simulation. For simulations Invol¬
ving relatively few entitlee, but lota of rates
or formulas, good old BASIC or FORTRAN la
One (MAOl'a "SynthaVision" eyatem, which
could be said to "elmulste" complex figures In
a three dimensional epees, U done in Portren;
P-5*C*.> for simulations involving a lot
of separate objects, special cases end diecreta
events. TRAC Language (see p. | J ) ia great.
U numerous mathematical formulas are involved,
and you want to change them around consider¬
ably til an experimental eon of way. APL ie
well suited (see pp 22, ) ■
There are * number of special "simulation"
language*, notably SIM SCRIPT and ops 8 The*#
have additional faaturea useful, lor instance. In
simulating event# over time, such aa "EVENT"
oommand* which synchronise or drsw division-
tine* in time (the simulated time). Simulation
language# generally allow a great variety of
data type* and operations on them.
The list -processing fanatic*, of course,
insist that thalr own languages (such aa LISP
and SNOBOL) are best And then there's PLATO
lea* P^Zfc). whoas TUTOH language is eplen-
did for both formulae and dlscrat# work-- but
allow, you only 1S00 variables, total (to bits
Tha thing I*, any ael o( assumptions, no
matter how Intricate, can be enacted by a compu¬
ter model. Anything you can express exactly
can be carred out. and you can aee Ita conse¬
quence* In the computer's readout-- a printout,
a screen display. or some other view into the
resulting date structure.
Obvloualy theee enactments (or sometime*
"prediction*") are wholly fallible, deriving any
validity they may have from the soundness of
the Initial data or model.
However, they have another important
function, one which la going to be very impor¬
tant In education and. I hope, general public
understanding, >■ computers get spread about
more widely and become more usable.
The availability of simulation models can
make thing# easier to understand. Well-set-up
simulation programs, available easily through
terminals, can be used as Staged Explanatory
Structures and Theoretical Exploration Tools.
The user can build hi* own wars, his own so¬
cieties, his own economic conditions, and aee
what follow* from the ways he sets them up.
Importantly, different theories can be applied to
tha same setups, to make more vivid the conse¬
quences of one or the other point of view.
(Indeed, similar facilities ought to be avail¬
able for Congress, to allow them to pour a new
tax through the population and see who suffers.
who gains. ..)
1 should point out here that tor this pur¬
pose-- Insightful Simulation-- you don't alwaya
need a computer. I have in mind the so-called
"simulation games." which If well designed give
extraordinary insights to the players. Allen
Calhamer's brilliant game of Diplomacy, for in¬
stance (Games Research, Boston; available from
Brentano's. NYC) teaches more about Internationa]
politics than you could suppose possible. 1 am
also intrigued by a game called "Stmsoc," worked
out by a sociologist to demonstrate the develop¬
ment of aocia) structures from a state of random
creation, but I haven’t played It. (Clark C.
Abt, of Abt Associates, Boston, has also done
s lol of Interesting design here.)
A last point, s very "practical" application.
Simulation makes it poaslble to enact thinga with¬
out trying them out in concrete reality. For in-
atance, in the lens-design systems mentioned
earlier. Ihe lenses don't have to be actually built
to find out their detailed characteristics. Nor
ia it necessary to build electronic circuitry, now.
to find out whether it will work-* at least that'a
what the salesmen say. You can simulate any
circuit from a terminal, and "measure" what it
does at any time or In any part with simulated
meters. Similarly, when any computer ia des¬
igned now, it's simulated before it's built, and
programs are run on the simulated computer,
aa enacted within a rest computer, to see if it
behaves os Intended. (Actually there are some
hot-wire types who insist on building things
first, but one assumes that the more aensible
computer designers do this.)
With automobiles it's harder; but GM, for
instance, aimulates the handling characteristics
of its cars before they're ever built-- so that
designers can redistribute weight, change steer¬
ing characteristics and so on, till the handling
chsracteritatlca come out Ihe way the Consumers
seem to like.
BIBLIOGRAPHY
Simulation magazine is the official journal of
Simulation Councils, Inc., the curiously-
named society of the Simulators. It costa
$18 a year from Simulation Councils. Inc..
Box 2228, La Jolla CA 82037.
ora^T'ONs
la an extension of Simulation In a fairly obvious
direction.
If simulation means the Enactment of some
event by computer. Operations Research means
doing these enactments to try out different strat¬
egies, and test the most effective ones.
Operations research really began during
World Wsr II with such problems as submarine
hunting. Given so-and-so many planes, whit
pattern should they fly in to make their catching
submarines most likely? Building from certain
types of known probability, (but in areas where
"true" mathematical answers were not easily
found), operations researchers could sometimes
find the beet ("optimal”) strategies tor many
different kinds of activity.
Basically what they do is play the situation
out hundreds or thousands of times, enacting it
by computer, and using dice-throwing techniques
(o determine the outcomes of all the unpredictable
parts. Then, after all entities have done their
thing, the program can report on what strategies
turned out to be most effective.
Example . In 1973 the Saturday Review of
aomethlng-or-other printed a piece on the solu¬
tion . by OR techniques, of the game of Monopoly.
Effectively the game had been played thousands of
times, the dice thrown perhaps millions, and
the different "players" had employed various
different strategies against each other In a varying
mix: Alwaya Buy, Buy Light Green. Utilities and
Boardwalk, etc.
A complete solution was found, the strategy
which tends (over many plays) to work beat. I
forget what it was.
Using another technique, the game of foot¬
ball was analyzed by Robert E. Macho) of North¬
western and Virgil Carter, a football personage.
Their ides was to teat various maxims of the
game, to find out which common rules about
beneficial plays were true. What they did was
replay fifty-six blg-lcaguc football games on a
play-by-play basis, rate the outcomes, and see
which circumstances proved most advantageous on
the average. I’ve mislaid the reprint ( Operations
Research , a recent year), and being totally ig¬
norant of football can remember none of the find¬
ings. Anyhow, that's where to look. (CM** f**'*,
The earlier explanation of Operation a
Research wasn’t quite right. It's any systematic
study of whnl works best. Computers can help.
BIBLIOGRAPHY
Irvin R. Hemzel, "How to Win at Monopoly."
Saturday Review of Science ■ Apr 73, 44-8.
Virgil Carter and Robert E. Machol, "Operations
Research on Football." Operations Research .
March 1971, 541-544.
GM ISSUES
For all I know you get annual mem¬
bership free with thet. I've alweya wanted
to join bul It was alwaya the one thing too
many; but their conference programs are
seneatlonal. Where else can you hear
papers on traffic, biology, military hardware,
weather prediction and electronic deeign
without changing your seal?
Until now, the obscurity of computers
has kept the public from understanding
that anything like political issues were
involved in their use. But now a lot of
things are going to break. For instance—
y^y^y^y^y^y^y^y^y
ws mr
"Simulation" means almost anything that in
any way represents or resemble* something.
Which la not to aay it's a useless or improper
term. Just a slippery one.
Ex imp lee . Here are weya we could "simu¬
late" a horse race:
Show dots moving around an oval track
on a completely random basis, and declare the
Aral to complete the circuit The Winner.
Assign odds to Indivldusl horses, and
then uee a randomizer to choose Ihe winner,
taking Into account those odds. (This is how the
PLATO "horserace" game works; see .)
Give conditional odds lo Ihe different horses,
baaed on possible "weather condition*." Than
flip a ooln (or the computer equivalent, weighted
randomisation) to tael the "weather conditions,”
and assign the hors*'* performance accordingly.
Program an enactment of a hors* race, in
which tha winner la salaried on Ihe baaia of
tha Interaction of tha horoscope* of horae and
rider.
Create a data structure representing the
three-dlmanatonal hinging of horae'e bones, and
th* interlaced timing of th* tha horae'* gait.
(This has bean duns at U. of Pennsylvania on a
DEC Stl.) Then have these stick figure* run
around * track (or tha data structure equivalent).
Using a synthetic photography system
such a* MAUI's Synthaviaion (see p.yt5i>. create
the ID date structure for th* entire surface or a
running horse over Ume; then make several copies
of this horse run around a track, and make aim
ulsted photograph* of it.
And ao on.
So don't be snowed by the torn “simulation "
** meena much, little or nothing, depending.
foWTHet TH* FBI?
J. Edgar Hoover's recent death
raised a very serious problem. What
about all those files he had been keep¬
ing? Responsible critics of the FBI,
such as Fred J. Cook, have claimed t.iat
Hoover's policy basically consisted of
chasing lone punks (like Dillinger,
Bonnie and Clyde), harassing political
dissenters, and keeping vast unnecessary
records on innocent citlxens-- thus vir¬
tually creating the vast network of or¬
gan! zed - crliiiein America, which stays
off the police blotters. Thus the ques¬
tion of the FBI Succession was an impor-
The question has been answered. In
July 1973 Nixon appointed Clarence Kelley,
police chief of Kansas City. After the
previous goings-on*- for instance, Nixon's
seeming to offer the post to Judge Byrne
while he was presiding over the Ellsberg
trial-- this looked to the press like a
staid and uncontroversial resolution.
But was itT
Kelley certainly is aware of tech¬
nology. It seows to be he that put dis¬
play screens in Kansas City police cars,
crested the ALERT system (Automated Law
Enforcement Response Team) and COPPS
(Computerized Police Planning System),
which for your amusement ties into MULES
(Missouri Uniform Law Enforcement System).
(See Melvin F. Bockelman, ''On-Line C**»-
puters Keeping Things Straight," which
describes the Kansas City computer setup.
Communications . June 73, 12-20.) in a
more threatening vein, supposedly the
Kansas City department kept computer
files on "militants, mentals and acti¬
vists." (Schwartz article, p. 19.)
What Kelley does is thus of interest
to us all. The big question is whether,
for all his concern with police automation,
he is also concerned with the freedoms
this country used to be about.
'Necessity has been the excuse for
EVERY INFRINGEMENT OF HUMAN FREEDOM.
IT IS THE ARGUMENT OF TYRANTS)
IT IS THE CREED OF SLAVES.
Edmund Burke
OF Co^PUTE^f
purer as "rigid" (see "The Myth of the"
Computer," p. ), and partly because
the military use so many of them.
But it's not the nature of a com¬
puter, any more than the nature of b
typewriter is to type poems or death
warrants.
n cnange, and Congress buys it for them,
No way is there room to cover this
subject decently. But we'll mention a
few things.
The Pentagon, first of all, with its
payroll of millions, with its stupendous
inventories of blankets and bombs and
toilet paper, was the prime mover behind
the development of the Cobol business
computing language. So a vast amount is
spent just on computers to run the mili¬
tary establishment from a business point
Of course that's not the interesting
stuff. *
The really interesting stuff in com¬
puters all cane' out of the military.
The Department of Defense has a branch
called ARPA, or Advanced Research and
Development Agency, which finances all
kinds of technical developments with
vaguely military possibilities.
It is thus a supreme irony that ARPA
paid for the development of: COMPUTER
DISPLAY (the Sketchpad studies *(. Lincoln
Labs; see p.^R\E>); TIME-SHARING (e.g.
the CTSS system, see p. fT); HALFTONE
IMAGE SYNTHESIS (the Utah algorithms; but
see all of pp. "St - 31 ); and lots
more. Some folks might say that proves
it’s all evil. 1 say let’s look at cases.
While they have military applications,
that's simply because they have appli¬
cations in every field, and the military
are just where the money is.
Just to enumerate a few more mili¬
tary things--
Command and control -- the problem
of keeping track ol who's done what to
whom, and what's left on both sides,
*M * r 4»s» rv—“jj 1 '-
It is a solemn irony that the great
"465L Command and Control System"-- a
grand room with many projectors driven
by computer, only something like those
in "Dr. Strangclove" and “Fail-Safe"--
may be a prototype for offices and con¬
ference rooms of the future.
“Avionics"-- all the electronic
gadgets in airplanes, including those
for navigation. (A recent magazine
piece described how wonderful it felt
to fly the F-111-- which has a computer
managing the Feel of the Controls for
you.)
"Tactical systems"-- computers to
anage battlefield problems, aim guns
id missiles, scramble your voice a*ong
■rinue air freauen " '*
"Intelligence"-- computers are used
to colleto information coming in from
various sources. This is no simple prob¬
lem-- how to find out what is so from a
tangle of contradictory information;
think about It. Don't think about how
we get that information.
doubt being applied to the immense quan¬
tities of satellite pictures thet como
back. (Did you know our Big Bird satel¬
lite either chirps back its pictures by
radio, or parachutes them as Droppings?)
Of course, the joker is thet all
this obsession with gadgets does not
seem to have helped us militarily at all.
The army seems demoralized, and the navjr
losing ground to a country that hardly
even has computers,
guis currcoixr, hukt
Boston welfare recipient# have been
systematically abort-changed for at laaat
14 year#, according to Comtarworld 110
Oct 7J, p. 2).
a aystasu analyst recently dlacoverad
that tha welfare program waa not calcul¬
ating coet-of-living Increases on a «**-
pound baele, aa it should have bean, but
aa a alalia Increase baaed each year on
an obeolsta original figure.
Mowerer, It’s too lata to ask tor
ref unde, and anyway not many welfare re¬
cipients taka Camputaruorld .
iu (Wv BkV
DEC
TVt ?I)peo|>k
The computer companies are often referred
to in the field as "Snow White and the Seven
Dwarfs"-- a phrase that stays the same even as
the lesser ones (like RCA and General Electric)
get out of the business one by one. The phrase
suggests that they’re all alike. To an extent;
but there is one company sufficiently different,
and important enough both in its history and its
continuing eminence, to require exposition here.
This is Digital Equipment Corporation, usually
pronounced "Deck," the people who first brought
out the minicomputer and continue to make fine
stuff for people who know what they are doing.
Other computer companies have mimicked
IBM. They have built big computers and tried
to sell them to big corporations for their business
data proceaslng, or big "scientific” machines and
tried to sell them to scientists.
DEC went about it differently, always de¬
signing for the people who knew what they were
doing, and always going to great lengths to tell
you exactly what their equipment did.
First they made circuits for people who
wanted to tie digital equipment together. Then,
since they had the circuits anyway, they manu¬
factured a computer (the PDP-1). Then more
computers, increasing the line slowly, but always
telling potential users as much as they could
possibly want to know.
The same for its manuals. People who
wrote for information from Digital would often
get. not s summary sheet referring you to a local
sales offtce. but a complete manual (say. for
the PDF-8), including chapters on programming,
how to build interfaces to it, and the exact
timing and distribution of main internal pulses .
The effect of this was that sophisticated users--
especially in universities and research estab¬
lishments-- started building their own. Their
own interfaces, their own modifications to DEC
computers, their own original systems around
DEC computers.
Digital Equipment Corporation, in response
to the "Energy Crisis" of 1973, didn’t turn out
thsir Christmas tree. Instead they hooked it up 57
to a water wheel they happened to have. Typical.
This policy has made for slow but steady
growth. In effect, Digital built a national cus¬
tomer base among the most sophisticated clients.
The kids who as undergraduates and hmngers-on
built interfaces and kludgey arrangements, now
as project heads build big fancy systems around
DEC equipment. The places that know computers
usually have a variety of DEC equipment around,
usually drastically modified.
Because of the great success of its small
computers, especially the PDP 8, even many com¬
puter people think they only make small compu¬
ter. In fact their big computer, the PDP-10, is
one of the most successful time-sharing computers.
An example of its general esteem in the field: it
is the ho6t computer of ARPANET, the national
computer network among scientific installations
funded by the Department of Defense; basically
this means ARPANET is e network of PDP-lOs.
DEC'S computers have always been designed
by programmers, for programmers. This made
for considerable suspense when the PDP-11 did
not appear, even though the higher numbers did,
and the grapevine had il that the 11 would be
a sixteen-bit machine. It proved to be well
waiting for (see p. 22.). and has since become
the standard sophisticated 16-bi» machine in the
industry.
An area DEC has emphasized from the first
has been computer display (discussed at length
on the flip side). Thus it is no surprise that
their interactive animated computer display, the
GT40 (see p.Sty) is an outstanding design and
success. (And - the University of Utah, currently
the mother church of computer display, runs its
graphic systems from PDP-10s.)
In this plucky, homespun company, where
even president Olsen is known by his first name
(Ken), it is understandable that marketing pizazz
takes a back seat. This apparently was the view
of a group of rebels, led by vice president Ed
deCastro, who broke off in the late sixties to
start a new computer company around a 16-bit
computer design called the Nova-- rumored to
have been a rejected design for ihe PDP-11. The
company they started, Date General, has not been
afraid to use the hard sell, and between their
hard sell and sound machine line they’ve seriously
challenged Ihe parent company.
But Digital marches on, the Cor-puter Fur's
computer company. If IBM is computcrdcm’s
Kodak, whose overpriced but quite reliable goods
have various drawbacks, DEC is Nikon, with u
mix-and-match assortment of what the hotshots
want. That's pluralism for you.
PDP-1
(18 bits)
KM«W V0UI>
rm
(There were no PDP-2, 3 or 13.)
ULTisifb??
DtC'j "awe (or*
I'm not getting any favors from DEC, I’m
just saying about them what people ought to
know.
However. I do have grateful recollections
of ihe warmth and courtesy with which people
from Digital Equipment Corporation have taken
pains to explain things to me. hour after hour,
conference after conference.
In the early sixties they had one man in
one small office to service and sell all of New
Jersey and New York City. Bui that one guy,
Dave Denniston. spent considerable time respon¬
ding to my questions and requests over a period
of a couple of years, and in the nicest possible
way. even though there was no way I could buy
anything. You don't forget treatment like that.
poynmes fcKwitMi
Some kinds of peripheral devices, or com¬
puter accessories, arc always necessary. Only
through peripherals can you look at or hear
results of what the computer does, store quan¬
tities of information, print stuff out and
whatnot.
Trying to print lists of available stuff
here is hopeless. There are thousands of
peripherals from hundreds of manufacturers.
If you buy a mini, figure that your peripherals
will cost J1S00 (Teletype) on uj>. But mainten¬
ance (see p. SC ) is the biggest problem. If
you buy peripherals from the manufacturer of
the computer, at least you can be sure someone
will be willing to maintain the whole thing.
(Independent peripheral manufacturers will
often repair their own equipment, but nobody
wants to be responsible for the interface.)
If you want a list sec "Table of Mini-
peripheral Suppliers," Computer Dec is ions .
Dec 72, 53-5; more thorough poop Is offered
by Datapro Research Corp., 1 Corporate Center,
Route 38, Moorestown NJ 08057.
As to the serious matter of disks, an ex¬
cellent review article is "Disc Storage for
Minicomputer Applications," Computer Design
June 1973, 55-66. This reviews both principles
of different types of disk drives, and what
various manufacturers offer.
Also helpful on disks and tapes: "Making
a Go of Ministorage," by Linda Dermcr. Com ¬
puter Decisions , Feb 74, 32-38. Best recent
survey.
soared?
It's just a
DECtape driVt
upside down.
Disk drive for the ll.
Hoot such deviate go
at 30 epine a second,
or 1800 rpm. The heads
that read and write
information are on
moving arms that have
to be poeitioned on
the different traoke.
(Some dieke have a head
for every track, which
aoete more.)
If you have disk drives
($5600 each) you need a
controller ($5500). Sigh.
The brown-coated diek
iteelf ie hidden in the
plastio case. Never¬
theless, they sometimes
get eoratahed or break.
A diek costs $75 and
holds up to 2,400,000
characters of infor¬
mation (1.2 million
PDP-11 words, which
are 18 bite each).
TYPIttL
(Hr
1 p
Prints some 300 lines
a minute (faster if
the lines are narrow).
Price around $15,000.
a>*svrt y
A card reader . .
pulses to the computer
based on tho holes
punched in the aarde.
Tome m we Boa
Surely nobody can resist the peripheral* offered
by General Turtle, Inc., 545 Technology Square, Cam¬
bridge, Massachusetts 021)9.
The Turtle ie e eort of caeaerole on wheele that
take* a pencil down the Middle . Attached to your
computer, It can be programmed to rambLe around draw¬
ing picture*, or juat do wheellee on the parquetry.
*600.
Then the Music Box le *600. It elnge in four
voices, enough for a lot of Vivaldi, doe* five octave*
and looka to the computer like e Teletype. They will
play you samples on the phone (611/661-1773).
For either of theae you need a Controller (*1300).
BRAILLE
Ho joke here. People are etill Baking
Braille copies of things by hand. But tha way
to do It is by computeri tha machine can punch
out new copiee of whatever'e stored in it,
repeatedly.
A Braille-punching adapter kit is avail¬
able for the plain 33 Teletype. I believe
from Honeywell.
A elBllar adapter kit for I We Syetem 3
ie available from IBM.
(It le of Interest that an early usa of
Mooere' TRAC Language was with Braille conver¬
sion.)
N\A6*Ktki WOo^Kfr
Any nuuber of different magnetic device*
are used for mas* storage of lymbolic (digital)
information* each has Its own medium, or fore
of storage.
The ones which are removable (called "re¬
movable media") are of all sorts.
EFFECTIVELY STANDARDIZED BY IBM
3/4-inch magnetic tape.
Pre-196S: 6 tracka date, 1 track parity.
Post-1965: B Hacks data, 1 track parity.
2741 disk
Stack of removable platters size of a
layer cake.
3330 disk
Same but bigger cake,
disk cartridge
Plastic case, size of coolie hat, en¬
closing disk,
floppy disk
rlesible, card-thin disk enclosed in
square 8" envelope,
data cell (not very coemon)
Plastic strips pulled out of wedge-
shaped tubes arranged in a rotating
cylinder. Strip is pulled out of this
carousel, whipped around a drue to make
temporary drum memory, returned to case.
EFFECTIVELY STANDARDIZED BY OTHERS
LINCtapS
3/4-lnch tape on a 4-inch reel (fits in
pocket]. specially coated against fric¬
tion, developed at Lincoln Labs for LINC
computer (see p. 41).
DECtape
Same site and reel but differently for¬
matted for DEC machines (varies with
K>dsl). Very reliable. A personal fav¬
orite of many programmer*.
3M CARTRIDGE
The Scotch-tepe people eay the cassette
i* unreliable, and offer as an alterna-
tlva a belt-driven quarter-inch baby,
coating maybe *1000 without interface.
CRAM (Card Random Access Memory)— rare
Big pieces of plastic (about four inches
by two feet) pulled by notches out of a
cartridge end whipped around a drum.
National Cash Register.
HARDLY STANDARDIZED AT ALL
"Cassettes”-- Philips-type audio-type cassette.
U»«d by vArioui manufacturer* in
various way*. Sykes. Sycor, DEC, Data
General and others have separate, and us¬
ually inctsspetible, eyatema.
never know what you’ll see nest. In 1969
firm announced a "high-density r.ad-only
sry davice" which anyone could see wee e
56
A LITTLE GEM FROM THE IBM SONGBOOK
(Who lays IBM doein’t encourage Individualism?
To th* tuna of ’Pack Up Your Troublai
In Your Old Kll Bag.")
"TO THOMAS J. WATSON, Preaidanl. IBM"
Pack up your troubles-- Mr. Watson’s here!
And smile, smile, smile.
He Is the genius In our IBM
He's the man worth while.
He's inspiring all the time.
And very versatile-* ohl
He la our strong and able President!
His smile’s worth while.
"Great organizer and a friend so true."
Say all we boys.
Ever he thinks of things to say and do
To Increase our Joys.
He Is building every day
In his outstanding style— so
Pack up your troubles, Mr. Watson's here
And Smile-- Smile-- Smile.
(As a nostalgic public service
Advanced Computer Techniques, Inc., of
Boston, gave sway LPa of IBM songs at the
'89 SJCC. They might Just have some left...)
"THERE IS A WORLD ELSEWHERE.”
-- Corlolanua
There Is no way to eacape IBM entirely. IBM
mediate* our contact* with government and medi¬
cine, with libraries, bookkeeping system*, and
bank balances. But theee Intrusions are still lim¬
ited, and moat of us don't hsve to live there.
There are many computer people who refuae
to have anything to do with IBM systems. Others,
not so emphatic, will tell you pointedly that they
prefer to stay as far away from IBM computers
aa possible. If you ask why. they may tell you
they don't care to be bothered with restrictive,
unwieldy and unnecessary complications (the JCL
language ia usually mentioned). This is one
reason that quite a few people atick with minicom¬
puters, or with firms using large computers of
other brands.
It is possible to work productively in the
computer field and completely avoid having to
work with IBM-style systoms. Many people do.
i3N\ LW
NEW CHIPS. . .
IBM can put pretty much anything on a tingle
chip, to make a functioning machine the size of a
postage stamp; but so csn a lot of other companies.
The question realty becomes whether what
goes on that chip ia a worthwhile machine that does
what people want.
.. .BUT THE SAME OLD BLOCK?
It la by no means clear that IBM has any
general ability to make computer systems easy to
uao.
This is a psychological problem.
Aa a corporation they are used to designing
systems that people have to use by fist, and must
be trained to use. contributing to the captivity
and inertia of the customer base. Thus the notion
of making things deeply and conceptually straight¬
forward. without special Jargon or training, may
not be a concept the company is ready for.
The famous Consent Decree of January 1956. (In a consent decree,
an sccused party admits no guilt but agrees to behave In
certain ways thereafter ) In response to a federal anti-trust
suit. IBM agreed to;
sell as well as lease its computers, and repair those
owned by others;
permit attachments to Its lessed computers,
not require certain package deals;
license various patents;
not buy up used machines;
ind get out of the business of supplying computer
services, i.e . programming and hourly rentals.
Unbundling decision, late sixties. While this was not a government
action bul a an internal policy decision by the company, it some
how had a public-relations appearance o( ofllcial compulsion.
Beset by pressures from makers of look-alike machines, users of
competitive equipment, and the threat o( anti-trust action, IBM
decided to change its policy and sell programs without computers
and computers without programs. Delight amongst the industry
turned to chagrin as this became recognized as a price hike.
The Telex Decision, September '73; Telex Corp. of Tulsa was awarded
>352,500,000 in triple damages [since reduced) lor losses attributed
to IBM’s "predatory" pricing and other marketing practices.
Much more important. IBM was required to disclose the
detailed electronics required to hook things to their computers and
accessories within sixty days ol announcing any. This was a great
relief for the whole industry. Essentially it mesnt IBM could no
longer dictate what you attach to their machines Unfortunately,
it is not clear whether this will stand.
But what we're waiting to hear about ia whether the Nixon Justice
Department la, or ia not, going to press the big antl-truat suit
which has been long brewing, al the persistent request of other
firms in the Industry.
"THINK OF THE COMPUTER AS ENERGY."
says a recent series of IBM ads.
Bul in terms of monopoly, price, and
the world's convenience, there would
seem only one way to complete the
analogy, via.;
"THINK OF THE COMPUTER AS ENERGY.
"Think of IBM as King Faisal."
SOME DIVISIONS OF IBM you may hear about
OPD
OPD
FED
ASDD
Components
8RA
Watson Lab
Office Products Division. Typewriters, copter*.
Data Processing Division. Computers and accessories.
Federal Systems Division. Big government contracts:
NASA atufl, and who knows what.
Advanced Systems Development Division. Very secret.
Division.
Msksa pans for tha othar guys. Including Integrated circuits.
Scianca Resaarch Associates. Chicago. Publishes taxtbooka
and learning kits.
T.J. Watson Rsaearch Laboratory. Weatchaater County,
north of Nsw York City. Tbaoratlcal and lookahead research.
fa.yi/6 of thf
IBM UMJRCIM
For a long time, during the
sixties. IBM's high prices provided
an environment that made It easy for
other companies to come into the field
and sail computers and peripherals.
These high prices were referred to ■(
"the IBM umbrella."
However, thle era ha* ended.
IBM now cuts prices in whatever ereee
It'e threatened. A brief flourishing of
companies making add-on disk and
core memories (or IBM computers has
become precarious; not only will IBM
now cut prices, but they have shown
themaelvas still disposed to invent new
restrictive arrangements (the recent
"virtual memory" announcement lor
the 370 claimed that the program
will only work oo IBM disk and coral.
BIBLIOGRAPHY
Harvey □. Shapiro, "l.B.M. and all the dwarfs."
Naw York Times Magazine . July 29, 1973,
10-38.
An objective, (actual article, sympa¬
thetic to IBM-- although it drew at least
one irate letter from an ibmer who didn’t
think it sympathetic enough.
"IBM: Time to THINK Small?" Newsweek. Octo¬
ber 1, 1973, 60-81.
Frank T. Cary, letter to the editor, Newsweek .
Ocl. IS 73, p t A snappish reply to
the above by the IBM Board Chairman,
who evidently didn't like the article very
much.
Robert Simuelson, "IBM's Methods." Naw York
Times Sunday financial section. June 3,
1973, p. 1.
-♦This article gives a unique
glimpse of some of the interesting things
that came to light in the Control Data suit
against IBM-- citing trial documents never
publicly released
* William Rodgers. Think , Stein and Day. 1969.
Subtilled A Biography of the Wataons
and IBM .
—► Concentrates on the daya before
computers. Fascinating profile of Watson,
a business tiger; but the view of the cor¬
poration in an evolving nation la general
Americana that transcends fiction.
Would you believe Rodgers says
Watson was the kingmaker wo put General
Ike in the White House?
Unfortunately, the book has relatively
leas on the computer era, so the inside
story of many of their momentous decis¬
ions since then remains to be told.
Hey wood Gould. Corporation Freak . Tower (paper¬
back. J
Marvelous; hard to get; Gould thinks
IBM quietly bought up all the copies.
The musinga of a sophisticated. clever
and observant cynic who began knowing
nothing about IBM. Gould's wide-eyed obser¬
vation of its corporate style and atmosphere
is a jolt to those of us who've gotten used
to it And he thought it was Just another btg
company!
Anonymous. "Anti-Trust: A New Perspective."
Datamation , Oct 73. 183-186.
Richard A. McLaughlin. "Monopoly Is Not a Game,"
Datamation . Sept. 1973, 73-77.
-*■ Questionnaire survey Intended to
test truth of common accusation* against IBM.
(Discussed in text above.)
W.David Gardner. "The Government's Four Years
and Four Month* In Pursuit of tBM." Data ¬
mation , June 1973, 114-115.
Almoat any issue of Computerworld or Datamation ,
the two main industry news publications,
carries arUcles mentioning complaint* about
IBM from various quarters on various Issues.
Datamation 's letters are also sometimes Juicy
on the topic.
Any issue of On Line , a news sheet of th* Computer
Industry Association, ten bucks a year.
(C1A-- no relation to the Intelligence agency
-- 16255 Ventura Blvd ., Enclno, CA 91316.)
T.A- Wise, "l.B.M.'a >5,000,000.000 Gamble."
Fortune . Oct 1986.
Daniel J. Slotnick, "Unconventional systisi.'
proc. SJCC 1967, S77-4B1.
Interesting, aeong othar rsaaona.
(or the haavlneaa of tha sarcase directed
et IBM and ite larger cc*puters.
* Killian Rodgers, "IBM on Trial." Harper 's.
May 1974, 79-84.
Continues where Think left off;
examines sone of the dirt"that caste out
in the Telex case, and other things.
The euthor regret* not being able to liat more
articles and book* favorable to IBM. but these do not
seem to turn up *o much However, here ere e few.
A Computer Perepecttve . by the office of Charlee
end Ray Eamea, Harvard U. Press. 113.
Angelina Pantagea, "IBM Abroad." Datamation .
December 1972, 54-57.
For an example ol the kind of adulation of IBM
beaed on faith, aeo Henry C. Wellich.
"Truei-Buating tha U.S.A.," Newaweek
1 Ocl 73, p. *0.
Th* IBM Songbook. any year-- they haven't been
issued since the fifties-- Is definitely a
collectible.
55
IBM announced a number of worthy objectives when the 360
line was announced in 1964. IBM should certainly be thanked for
at least their lip service to these noble goals.
1. ’One machine for all purposes, business and scientific.’
(Thus the name ”360," for the "full circle" of applications.)
By "business" this mainly meant decimal , at four bits a digit.
Actually this meant grafting 4-bit decimal hardware to an other¬
wise normal binary computer, and making both types of users share
the same facility.
2. 'Information storage and transmission will be stan¬
dardized.' The 360 was set up to handle information 4 bits at
a time, 8 bits at a time, 16, 32, and 64 bits at a time. (The
preceding standard had been 6, 18 and 36 bits at a time.)
In their 360 line, IBM also replaced the industry’s stan¬
dard ASCII code with a strange alphabetical code called EBCDIC
("Extended Binary Coded Decimal Information Code"), ostensibly
built up from the 4-bit decimal code (BCD), but believed by*
cynics to have been created chiefly to make the 360 incompatible
with other systems and terminals.
Unfortunately this compatibility has been undermined bv
numerous factors, especially the variety of operating systems
intii?atei lf ‘| 0Zftn m ;N or types • and the language processors
intricately graded according to computer size. Both these fac-
Juters^WMir^^^ct ■ pr °« r “» £«£« c«-
r 0 e ffect of this Standardization" has indeed
e " °J aCllltatC t *> e novin * °f Programs from small computers
to big ones, a more important effect has perhaps been to make it
jlf- rd lo move from a computer to a smaller one. Note TTTS-
usefulness of this apparent paradox to“rBM's mTiTetinR.
The secret of it all, of course, lies in IBM’s keen under¬
standing of how to sell big computers. The comptroller or
somebody like him, generally makes the final decision: and if
he is told that the one computer will run "all kinds" of pro¬
grams, that naturally sounds like a saving. Shades of the F-
111. (Businessmen’s trust and respect for IBM is discussed
elsewhere in this article.)
7H£ BkrQOes'TioMS
Between the trade press and dozens of acquaintances
In the field, almost everything 1 hear about IBM and its
products is negative (say five or ten to one)-- except from
people who work or have relatives there.
Perhaps it’s Just sour grapes. Or the authority-
hating character of research types. Or selective reading.
Or perhaps there really Is something sinister.
The major questions are these.
1. How clean is their salesmanship?
2. Are their systems unnecessarily difficult or
cumbersome on purpose?
3. How deep is their system of entrapment and
forced commitment of the customer? How
necessary are the de-standardl 2 ations and
the constant changes?
4. Do they have a final liberating vision? Do they
really, after all. Intend to bring about a day
when life is easier for people? When the
difficulties of present-day computer systems,
especially theirs, wither away? 1 think that
history's Judgment on IBM in cur time
may narrow down to that simple question.
(In this light it is not hard to understand
IBM's stand on software copyrights vs. patents.
IBM Is against programs being patentable, which
would cover abstracted properties, but argues
in favor of copyright, whose protection is
probably more limited to the particulars of a
given program. If they have their way. It would
be assured that IBM could use any ingenious
new programming tricks without compensation,
whereas all unnecessary complications of bulky,
cumbersome software would be covered In
entirety by copyright.)
Finally, it has not been demonstrated that
IBM has any general ability to make systems
conceptually simple and easy to use. (Two
good examples of hard systems are the Mag
Tape Selectrlc and Datatext-- easy for program¬
mers, but hardly for secretaries.) There seems
to be no emphasis on elegance or conceptual
simplicity at IBM. Those who adopt such a
philosophy (such as Kenneth Iverson) do so
on their own.
As mentioned earlier, this has something
to do with the fact that individuals generally
use IBM's systems because they have to, being
employees or clients of the firms that rent IBM
equipment, so there is no impetus to design
programs or systems to run on simple or clear-
minded principles, or dress out Intricate systems
so they can be used easily.
4. THE IMAGE.
It is hard to analyze images, corporate or
peraonal They are often received in such differ¬
ent wsya by different populations. But there may be
a commonality to the IBM image sa generally seen.
The Image of IBM involves some kind of cold magic,
a brooding sense of sterile efficiency. But other
things are percolating in there. If we slide that
connotation of efficiency aside, the IBM Image
seems to have two other principal components,
authoritarianism and complacency. It is this mix¬
ture that longhair* will naturally find revolting.
This same combination, however, may be exactly
what it is that appeals to business-management
typas.
r
IF YOU REALLY WANT IT.
you can gat charactar-by-charactsr
responding systems on IBM computers.
The new Stock Exchange system uses a
"Telecommunications Access Method"
permitting non-IBM terminals to respond
character-by-character, just at systems
for non-computer-people should.
Trying to use this Input-output
program on your local IBM computer 1*
another problem, though. Aside from
program rental coata. there ta the prob-
lam o l lla compatibility with the whole
Una of IBM software. Adaptations and
reprogramming would probably be
necessary up end down the line ‘
THE FUTURE
What will IBM do next?
Speculation Is almost futile, but necessary
anyhow. The prospects are fascinating if not
terrifying.
No one can ever predict what IBM will do; but
trying to predict IBM's actions-- IBM-watching is
something like Kremlin-watching— is everybody's
hobby in the field. And its consequences affect
everybody. With so many things possible, and
determined only in the vaguest way by technical
considerations, the question of what IBM chooses
to do next is pretty scary. Because whatever
they do we'll be stuck with. They can design our
lives for the foreseeable future .
We know that in the future IBM will announce
new machines and systems, price changes (both up
and down) in fascinating patterns, rearrangements
of what they will "support," anfi changes in the
contracts they offer (see box. "IBM's Control").
Occasional high-publicity speeches by IBM high
officers will continue to be watched with great care.
But mainly we don't know.
IBM's slick manufacturing capabilities mean
that practically any machine they wanted to make,
and put on a single chip, they could, and in a
very short time. (The grapevine has it that the
Components Division, which makes the computer
parts, has bragged within the company that it
doesn't really need the other divisions any more
— it could just put whole computers on teeny
chips if it wanted to.)
In this time of the 370, things are for the
moment stable. The 370 computer line is still their
main marketing thrust. Having sold a lot of 370
computers (basically sped-up 360s), their idea is
at the moment to sell conversion jobs to adapt the
370 to run the new "Virtual System" control pro¬
gram (VS or OS/VS or various other names). This
system (which is. Incidentally, widely respected)
makes core memory effectively much larger to
programs that run on it. This effectively encour¬
ages programmers to use tons of core, by means
of virtual memory; essentially getting people in
the habit of programming as if core were infinite.
This extension of apparent memory size distracts
from any inefficiencies of both locally written pro¬
grams and IBM programs, thus tending to increase
use and rental charges.
When that marketing impetus runs out we'll
see the next thing.
The other new IBM initiative is with smaller
machines, the System 3 and System 7. being pushed
for relatively small businesses. That 19 where they
see another new market. How easy and useful their
programs are in this area will be an important
question.
With the System 7. a 16-bit minicomputer
for $17,000, IBM has at last genuinely entered the
minicomputer market. (Balancing its speed and
cobi against comparable machines, we can figure
the IBM markup as being about 50%. which Is
typical.)
In addition, it ia rumored that IBM might
put out a tiny business mini, to sell out of OPD.
( Datamation . Dec 72, 139.) But really, who knowa.
In addition to this huge-memory strategy for
its big machines, and the starting (oray Into spe¬
cialized mini systems, there is the office strategy
and "word processing."
IBM has conceptually consolidated its
various magic-typewriter and text services under
the name of "word processing," which means any
handling of text that goes through their machines.
This superficially unites their OPD efforts (type¬
writers and dictation machines) with things going
on in DPD, such as Datatext, and allays inter-
divisional rivalries for awhile Also, by stress¬
ing the unity of ths subject matter, it leaves the
door open for lster snd more glamorous initiatives,
such ss hypertext systems (see "Carmody's System."
flip side) .
In other words, the foot is In the door. Mr.
Businessman has the idea that automatic typing
and things like that are IBM's special province.
+
Few firms anywhere have the confidence
to advertise generloaily a product which
la mad* by other* as well, as in IBM's
"Think of the computer ss energy" series.
R4K. IgM ’
Even if it is true, as Anonymous says (see Bibliography)
that IBM intimidates people and keeps its enemies
from getting jobs et IBM-oriented establishments,
that’s not the end of the world.
\ Grosch, Gould, Rodgers and McGurk are alive and working
Extramural harassment like that employed by CM against
Nader, for example, has not been reported.
END OF THE DINOSAURS?
To a very great extent, IBM's computer
market Is based on big computers run in batch
mode, under a very obtrusive operating system.
Many people are beginning to notice, though,
that many things are more sensibly done on small
computers than on big ones, even in companies
that have big computers. That way they can be
done right away rather than having to wait in line.
Is this the mammal that will eat the dinosaur eggs?
On the other hand, a very unfortunate trend
is beginning to appear, an implicit feud within
large organizations, which may benefit IBM's big
computer approach. Those who advocate mini¬
computers are being opposed by managers of the
big computing installations, who see (he minis
as threatening their own power and budgets. This
may for a long time hold the minis back, perhaps
with the help and advice of computer salesmen who
feel likewise threatened. But there will be no
holding back the minis and their myriad offspring,
the microprocessors (see p. ^ ). And the inroads
should begin soon.
(Others are growing (o know and love true
high-capacity time-sharing as a way of life, like
that offered for DEC. GE and Honeywell machines.
This, too, may begin to have derogatory effects on
IBM's markets.)
Finally, it must be noted that almost all big
companies have computers, usually IBM computers,
and so an era of marketing may well have ended.
It may be possible for IBM to go on selling bigger
and bigger computers to the customers who already
have them, but obviously this growth can no
longer be exponential.
A GfOT) IW
Herb Grouch, now editorial director of Computerworld , is perhaps
worst enemy. Once he worked for old man Watson, and was the
3M employee allowed to have a beard. Now. among other Udngs, ne
/ 7 , . _,__.houi the Menace of IBM.
Yet IBM'* main computer sales strategy today is to stream the a van
tag** of big computers with lot* of core memory (and persuade you you
don't want highly Interactive system* or independent minicomputers)
And the fundamental rule sUUng the advantage* of big computars
la called Grosch's Law , formulated year* ago by none other. See p.
54
An Interesting example of an IBM non-
breakthrough we* the dramatic ennouncetnent In
1984 of the 360 computer, portreyed as a machine
which would at last combine the functions of
both "butlnaes" computer* and "scientific" com*
putere. But other companies, such ea Burroughs
(with the 5500) had been doing this for some
time. The quaint separation of powers between
scientific computer* (with all-binary storage of
numbers) and business computers (decimal
storage) we* baaed only on tradition and mar¬
keting consideration*, and was otherwise unde¬
sirable. In amalgamating the "two types," IBM
was only rescinding their own previous un¬
necessary distinction. The drams of the an¬
nouncement derived in large measure from the
streas they had previously laid on the dlvtelon.
( Fortune ran an Interesting piece on the decision
struggles preceding the Introduction of the 360
computer, and the Internal arguments as to whe¬
ther there should be one line of computers or two.
See the five-bllUon-dollar gamble piece. Biblio¬
graphy.)
Thla ties In closely with another interes¬
ting aspect of the IBM Image, the public notion
that IBM la a great Innovator, bringing out
novel technologies all the time. It is well known
In the field that they are not: IBM usually does not
bring out a new type of product until some other
company has pioneered it. (Again remember
the earlier point, that the product offering is a
strategic maneuver.) Bui of course such facta
do not appear in the promotional literature, nor
are they volunteered by the salesman.
The expression for this in the field is
that IBM "makes things respectable." That is,
customers get that reassured feeling, when IBM
adds other people's Innovations to their product
line, and decide it's okay to go ahead and rent
or buy such a product. (This also sometimes
kick* business back to the original manufacturer.)
A few examples of things that were already
on the market when IBM brought them out. often
making them sound completely new: transistorized
computers (first offered by Philco). virtual mem¬
ory (Burroughs). microprogramming (introduced
commercially by Bunker-Hamo).
This Is not to say that IBM is incapable of
Innovation: merely that they are never in a
hurry about it. The introduction of IBM pro-
ducta ia orchestrated like a military campaign,
and what IBM brings out is always a carefully-
planned. profit-oriented step intended not to
dislocate its product line. This is not to say
that they don’t have new stuff in the back room,
a potential arsenal of surprises of many types.
But it is probable that most of them will never
be seen. This is because of IBM’s "impact”
problem .
Unique in IBM's position is the problem of
fitting new products into the market alongside
its old ones. Its problem is much worse, say,
than that of Procter 6 Gamble. The problem is
not merely Its size and the diversity of its
products, but the fact that they may interfere
with each other ("Impact" each other, they say)
in very complicated ways. A program like
their Datatext, for example, which allows cer¬
tain kinda of text input and revision from ter¬
minals, may affect its typewriter line. These
are no small matters: the danger is that some
new comblnstion of products will save the cus¬
tomers money IBM would otherwise be getting.
Innovations must expand the amount IBM is
taking In. or IBM loses by making them.
These complications of the product line
in a way provide a counterbalance to IBM's fear¬
some power. The corporation has an Immense
Inertia based on Its existing product line and
customer base, and on ways of thinking which
have been carefully promulgated and explained
throughout Its huge ranks, that cannot be
revised quickly or flippantly.
Nevertheless It is remarkable how at
every turn-- notably when people think IBM
will be eel back-- they manage to make policy
deciaiona or strategic moves which further con¬
solidate their poaltion. Often these seem to
involve restricting the way their computers will
be used (see box, "lBM'e Control,")
(The most ironic such countermove by IBM
occurred a few years ago with the Bo-called
"unbundling” decision. IBM at last agreed (on
complaint from other software firms) to stop
giving its programs away to people renting the
hardware. Glee was widespread In the Industry,
which expected IBM to lower computer prices
in proportion to what it would now charge for
the software. Not at all IBM lowered its com¬
puter prices by a minuscule amount and slapped
heavy new prices on the software-- often
charges of thousands of dollars per month.)
A persistant rumor is that IBM fires
all Its salesmen in a geographic
area if a key or preelige sale ia
"lost." as when M.l.T,'a Project
MAC switched over to General Electric
computers in the sixties, or when
Western Electric Engineering Research
Center passed over IBM computers
to get a big PDP-10.
Much at some people would like
to believe these stories. there seems
to be no documentation. You would
think one such victim would write
an article about it LI it were true.
Finally, there la the popular doctrine of
IBM's Infallibility. Thla. loo. la a ways from
the truth. The moat conspicuous example waa
something called TSS/360.
TSS/360 waa a time-sharing system--
that Is, the control program to govern one
model of the 360 as a time-sharing computer.
According to Datamation ("IBM Phases Out Work
on Showcase TSS Effort." Sept. 1. 1971, 58-9).
over 400 people worked on It Bt once for a total
of some 2000 man-years of effort. And It was
scrapped, a writeoff of some 100 million dollars
In loat development costs. The system never
worked wall enough. Reputedly users had to
wait much too long for ths computer's responses,
and the system could not really compete with
those offered elsewhere.
The failure and abandonment of this pro¬
gram is thus responsible for IBM's present non¬
competitive position In time-sharing; customers
are now assured by IBM that other things are
more important. IBM-haters thank their stars
that this happened. Cynics think it conceivable
that high-power time-sharing was dropped by
IBM in order to shoo its customer base toward
areas it controlled more completely.
Two other conspicuous IBM catastrophes
have been specific computers: the 360 model 90
In the late sixties, and a machine called the
STRETCH somewhat earlier. Both of these
machines worked and were delivered to cus-
lomers. (Indeed, the STRETCH la said by some
to have been one of the best machines ever.)
But they were discontinued by IBM as not suf¬
ficiently profitable. Therein is said to have
been the "failure." (However, it has been al¬
leged in court cases that these were "knockout"
machines designed to clobber the competition
at a planned loss.)
B. Negative views of IBM systems.
In the technical realm. IBM is widely un¬
loved because many people think some or all of
their computers and programs are either poor,
or far from what they should be. The reasons
vary.
Some of the people feeling this way are
IBM customers , and for a lime they had an or¬
ganized lobby, called SHARE (which also facil¬
itated sharing of programs) . Recently, however,
SHARE has become IBM-dominated, a sort of
company union, according to my sources.
The design of the 360, while widely ac¬
cepted as a fact of life, is sharply criticized
by many. (See "What's wrong with the 3607",
P 11 -)
IBM's programs, while they are available
for a broad variety of purposes, are often notor¬
iously cumbersome, awkward and inefficient,
and sometimes dovetail very badly. However,
the less efficient a program is. the more money
they make from it. A program that has to be
run for an hour generates twice as much revenue
than if It did its work in thirty minutes; a pro¬
gram that has to be run on a computer with, say,
a million spaces of core memory generates ten
times the revenue It would in two hundred thou¬
sand.
IBM programs are often thought to be
rigid and restrictive.
The complex training and restrictions
that go with IBM programs seem to have
interesting functions. (See box. "IBM's Control.")
C. Theories of IBM design.
The question Is. how could a company
like IBM create anything like the 360 (with its
severe deficiencies) and its operating system or
control program OS (with its sprawling compli¬
cations, not present in competitors' systems)?
Three answers are widely proposed: On Purpose
Ithe conspiracy theory), By Accident (the
blunder theory), and That's How They're Set
Up (the Management Science theory) . These
views are by no means mutually exclusive.
The Management Science theory of IBM
design is the only one of these we need take up.
The extensive use of group discussion and
committee decisions may tend to create awkward
design compromises with a certain intrinsic
aimlessness, rather than incisively distinct and
simple structures. (See Gould's marvelous
chapter. "The Meeting." 58-80.)
Their use of immense teams to do big
programming joba. rather than highly motivated
and especially talented groups, la widely viewed
as counterproductive. For instance, Barnet A.
Wolff, in a letter to Datamation (Sept. 1, 1971,
p. 13) saya a parucular program
"remain* ineffficlent, probably because of
IBM's unfortunate habit of using trainee*
fresh out of school to write their
systems code."
There may also be something in the way that
projects are initiated and laid out from the top
down, rather than acquiring direction from
knowledgeable people at the technical level,
that creates a tendency toward perfunctoriness
and clunky structure.
Thus there may very well be no inlontlonsl
policy of unnecessary complication (see Box,
"IBM's Control") . But the way In which goals
are set and technical decisions delegated may
generate this unnecessary complication.
1 iijeunoiyutiDf-rwt
It is unfortunate that Rodgers'
remarkable book does not lotlow the
details of IBM's computer designs snd
politics In the computer age. to.,
since 1955 Later work, perhaps
helped by some Pentagon Papers, will
have to relate the decision processes
that occurred in thla unique national
insUtution to the eyetams it has
produced and the stamp It has put
j on the world. ____
QUttit HW1
OF
IBM appeared in 1911 aa the con¬
solidation of a number of small companies
making light equipment, under the name
C-T-R Company (Computer-Tabulatlng-
Record). This was prophetic, consid¬
ering how aptly it described the com¬
pany's future business, and especially
prophetic considering that today’s
stored-program computer was undreamed
of at that time.
According to William Rodgers'
definitive company biography Think ,
the company’s creator was a shrewd
operator named Charles R. Flint,
dashing entrepreneur and former gun
runner to the South American republics,
who in his shrewdness brought in to
run the company an incredibly talented,
fire-breathing and self-righteous indi¬
vidual named Thomas J. Watson, even
though Watson at that time was under
prison sentence for his sates practices
at another well-known company . The
sentence was never served, and Watson
went on to preside for many years
over a corporation to which he gave
his unique stamp.
Watson arises from the pages of
Think as a sanctimonious tyrant,
hard as nails yet reverently principled
in his words: the pillar of fervid,
aggressive corporate piety.
IBM was totally Watson's
creation. The company became what
he admired in others, a mechanism
totally obedient to his will and imple¬
menting his forceful and lnspiringly
rationalized convictions with alacrity.
As the Church is said to be the bride
of Christ, IBM might be characterized
as the Bride of Watson, molded to the
styles of demandingness, pressure,
efficiency and pietism which so char¬
acterized that man. But the ideas
flowed from Watson alone, except for
a few confidantes who received his
nod. The company is vastly bigger
now, and slightly more colorful, in a
muted sort of way; but it is still the
stiff and deadly earnest battalion of
his dream.
Because of Watson's background
as salesman, he made Sales the apex
of the corporation. The salesmen had
the most prestige within the company
and could make the most money; below
that was administration, below that,
technical staff.
Watson eliminated the meat-slicing
machines, and pushed the product line
based on punched cards developed by
IBM's first chief engineer, Herman
Hollerith. According to Rodgers, it
was impetus from the Depression, and
the new bookkeeping requirements of
Roosevelt's remedies, that skyrocketed
the firm uniquely during the depths of
general economic catastrophe, till
Watson came to draw the highest salary
of any men in the nation. In 1934 his
Income was 4364,432 (Will Rogers, not
the author of Think , was second with
4324,314) . Watson had neatly arranged
to get 5% of IBM's net profit.
While IBM participated In the
creation of certain early computers, it
la interesting that Watson dismissed
Eckert and Mauchly when they came
around after World War II tring to get
backing for their EN1AC design, in
certain ways the first true electronic
computer Eckert and Mauchly went
to Remington Rand, and the resulting
Unlvac was the first commercial
computer.
However. IBM bounced back
very well. If there was one thing they
knew how to do it was sell, and when
they brought out their computers it
was practically clear sailing, (The
Univac I was the first of many compu¬
ters to be delayed and boggled in the
completion of its software, and this
considerable setback helped IBM get
the lead very quickly; they have
never lost It since.)
In the early sixties the IBM 7090
and 7094 were virtually unchallenged
as the leading scientific computers of
the country But IBM in the late six¬
ties almost relinquished the fields of
very big computers and time-sharing
to other companies, and their compu¬
ters are not regarded as innovative.
Nevertheless, IBM's Systems 360 and
370. despite various criticisms, hive
been very successful; thousands of
them are in operation around the globe,
far more than all their rivals' big
computers all put together. This des¬
pite the fact that some of these systems
have failed, including the big Model 91
(an economic failure) and the TSS/360
time-sharing program, a technical
catastrophe.
They have from time to time
been accused of unfair tactic*, and
various antitrust and other actions
(see "Legal Milestones" box) have
required IBM to change its arrange¬
ments in various ways. One decree
required them to sell the computers
that before they had only rented;
another decision, to. "unbundle." or
sell computers separately from their
programs (previously "given" away
with the computers they ran on). Is
widely believed to have prevented
government action on the same
matter. Showing characteristic
finesse. IBM thereupon lowered the
computer prices almost imperceptibly,
then slapped heavy price-tags on
the programs that had previously
been free.
Recent moves by the government
have suggested an especially serious
and far-reaching anti-trust suit against
IBM. possibly one that might break the
company up, with its separate divisions
going various ways. However, in
today's climate of cozy relations be¬
tween business and government. It is
hard to imagine that such matters
would not be settled to IBM's liking.
This lends a curious tint to a remark
one IBM person has made to the author,
to wit, that maybe IBM wants to be
broken up. That might be one way of
reducing the unwieldiness and inter¬
dependency of Us product line; In
addition to reducing its vast, under¬
utilized personnel base. (Another
angle: Acting Attorney General Bark
has expressed the view that IBM i*
big only because its products and
management are wonderful, so the
antitrust case may simply evaporate
during the rump days of the Nlxcm
incumbency.)
An interesting aspect of IBM publicity ia its stress on statue.
Publicity photographs often show a subordinate seeking advice
from a superior. IBM ads appeal to the corporation president
in ell of ua- - either Doing II Alone (taking a long walk over an
Executive Decision) or soberly directing a leaser employee
In one extraordinary case, we nw worahlpful convicts at the
feet of a Teacher implausibly situated in the corner of a prison
yard.
PROVINCIAL?
53
There would teem to be no queitlon that
IBM people ere comparatively conservative and
conventional. This partly because that's who IBM
hires (though they reportedly urge tolerance of
the unusual employee In a training film, "The Wild
Duck"). A huge number oflBM people never
worked for anybody else: obviously thla affect!
the perspective, like slaying at one university
all your life, or in one city.
It may also be that because IBM places such
a premium on dependability and obedience, new
ideas (and the abilities needed to generate them)
naturally run Into a little trouble. Some critics
find among IBM people a heavy concern with con¬
ventional symbols of achievement, and (unfor¬
tunately) seeing the world stuck all over with
conventional labels and Middle American atareo-
typee
Some of the most amusing material on thla
comet from an odd source a writer named
Heywood Could who. all unprepared, became a
consultant to IBM. earned unconscionable amounts
of money ($40,000 In six months). and lived to
writ# a very funny and obaervant book about It
(see Bibliography) .
I hope to be able to report In future
editions of this book that IBM has moved
firmly and crtdlbly toward making its sys¬
tems clear and simple to use. without re-
rsquiring laborious attention to needless
complication! and oppressive rituals.
I X One of the things we often forget Is
'■‘'j lhat public-spirited corporations can be
I reached, they do listen, and IBM la nothing
\_y If not public-spirited-- except when It
I comes to the design of its systems.
t~\ J
'*-f f hope that thla book will help
people who are Inconvenienced by computer
_systems to understand and pinpoint what
J they think is wrong with lhe systems-- in
(~7\ their data structure, interactive properties,
j or other design features-- and that they
ZJ. “HI try to express their dlecontents Intel- /
\ llgently and constructively to those res- \
J ponslble. Including, where appropriate. /
International Business Machines Corporation. I
2. SALES TECHNIQUES.
But it la necessary on these matters to see
how difficult things can be for IBM people. To be
identified as an IBM person la something like wear¬
ing a ring in your noas, a yarmutka or a halo:
an antrapment in a social rola that makes the indi¬
vidual's position awkward among outsiders. IBM
people often have to take guff at parties, unless
they are IBM parties. Defensiveness may account
lor some of the Overdo, and some of the clannlah-
BRA1NWASHED?
It Is true that IBM people are essentially In
their own world . One theorv is that comparl-
mentsllzation within the firm (rather visible in
their designs) may tend to stifle. Indeed, because
IBM people can expect to be briefed and schooled
in every technical matter they will need to know
for a given assignment, the incentive to follow
technical developments through outside magazines
and societies may be reduced. Between Think
magazine and corporate briefings, it is possible
for IBM people to be comparatively (or even com¬
pletely) unaware of Innovations elsewhere In the
field, except ax these new developments are
presented to them within lhe organization. In
thla light it la easy to understand the lbmera'
sense of certainty that their firm invented every¬
thing and is at the forefront.
Of couree many fine research efforts do go on
there, in considerable awareness of what's hap¬
pening elsewhere. Particular individuals at IBM
have done excellent research on everything from
computer hidden-line Imaging lo the structure of
the genetic code and computer-synthesized holo-
grsmt. APL itself (see pp.JL‘31. as developed
by Iverson at Harvard and later programmed by
him at IBM, is another example of sophisticated
individual creativity there. So it's entirely
possible. But IBM certainly has no monopoly on
understanding or creativity, and IBM-hatera
sometimes talk aa if the reverse is true.
It is IBM's alleged misbehavior in pursuit
of sales that has drawn some of the strongest
criticism within the Industry, as well as consid¬
erable litigation. Their "predatory pricing"
(a term used by the judge in the recent Telex
decision), and other mean practices, are (whe¬
ther true or false) folklore within the industry.
These accusations are well summarized
by "Anonymous" in a recent article (see Biblio¬
graphy) . Basically the accusations against
IBM's sales practices are that they play dirty:
if you. say. the computer manager in a business
firm, want to buy equipment from another out¬
fit. IBM (so the story goes) will go over your
head to your boss, accuse you of Incompetence,
try to get you fired if you appose them, and
Heaven knows what else. Anonymous claims
lhat various forms of threat. Intimidation, "hard¬
sell scare tactics" and "behind-the-scenes man¬
ipulation" are actually standard practice in IBM
sales, he or she alleges various instances in
certain municipalities.
Such behavior is emphatically denied,
though not in relation to lhat article, by Board
Chairman Cary. In a recent letter to Newsweek
(aee Bibliography). Cary emphasizes the impor¬
tance of IBM's 76-page business Conduct Guide¬
lines. Whether these are publicly examinable
is nut stated.
These charges were also taken up con¬
cretely in a recent survey of computing managers
done by Datamation (summarized by McLaughlin
in "Monopoly Is Not a Game;" see Bibliography).
In Datamation 's analysis of this survey, the
managers did not seem to agree with Ihese
charges against IBM. However, it must be
noted-- and this seriously calls into question
the entire survey as analyzed-- that out of 1100
panelists to the questionnaire. Datamation only
considered 389 responses "usable." partly (it is
staled) because many did not give data allowing
themselves to be identified. Considering the
widespread (ear of IBM in the field, this may
have strongly biased the poll in favor of IBM.
"When we went from IBM to
National Cash Register, it was like
the difference between night and day,"
Retired hardware executive,
talking about Inventory programs
(Incidentally, ft ia amusing lo note that
even In Ihlt remaining company, in terms of
"performance per dollar," the managers surveyed
(and aurviving the weedout) ranked the top
three companies as DEC. Burroughs and Control
Data. IBM was worst out of 8. Obviously
service counts for a lot.)
An Interesting view on IBM's sales ethics
was expressed recently by Ryal R Poppa,
president of Pertec Corp.
"In the past, when there have been sales
situations where ’you can't honor the
policy and win the deal.' IBM has violated
the policy with the practice, he said."
However, he believes that situation Is changing
under IBM's new management, so that the guide¬
lines will be observed in the future. ("Popps
Sees Several IBM Changes." Computerworld.
21 Nov 73. 29.)
The people who take these matters of IBM
sales practices most seriously-- IBM's competi¬
tors-- now have their own organization, the
Computer Industry Association. This is an asso¬
ciation o( computer companies, which has aa
its intention the "establishment and preservation
of a sound and viable U ,S computer industry .
based on... free and open competition." Empha¬
sis theirs. Translation: they're out to get IBM.
President Dan L. McGurk. formerly of Xerox
Data Systems, has blood in his eye. Member¬
ship is open only to computer companies, but
their newsletter On Line is available to indivi¬
duals (see Bibliography) . Anyone seriously
interested in ihese matters is referred to them.
3. TECHNICAL DECISIONS AND DESIGNS
A. Prologue.
Part of the myth of IBM's Corporate perfec¬
tion Is based on the nation Ihsl technical matters
somehow predominate in IBM's decisions, and
that IBM's product offerings and designs thus
emerge naturally and necessarily and inevitably
from these considerations. This is rather far
from the truth.
IBM presents many of their actions as tech¬
nical. even as technical breakthroughs, when
in fact they are strategic maneuvers. The an¬
nouncement of a new computer, for example,
such as lhe 360 or 370. Is usually made to
sound as if they have invented something special,
while in fact they have simply made certain
decisions as to "which way they intend lo go"
and how they plan to market things in the next
m VHttUAC RtCIMUbCS
Now, there are many manufacturers who
think this is very wrong of IBM; who believe
they should have the right to sell accessories
and parts-- especially core and diak memories--
to plug onto IBM's computers. II has been
generally possible for these other manufseturers
to work these interconnections out awhile after
the computer comes out on the market, but
it's getting more difficult.
IBM controls the industry principally by
controlling its customers. Through various
mechanisms, ll seems lo enforce the principle
that "Once an IBM customer, always an IBM
customer ." With an extraordinary degree of
control, surely possessed In no other field by
any other organization in the free world. It
dictates what its customers may buy. and what
they may do with what they gel More than
this: the exactions of loyalty levied upon IBM's
customers are similar. In kind and degree, to
whit U demands of its own employees IBM
makes the customer's employees more and more
like its own employees, committing them as
individual*, and effectively committing the com¬
pany that buys from it, to IBM service In
perpetuity.
Here are some of the ways this system of
control seems to work. We are not saying here
that this is necessarily how IBM plans it.
rather, theme are the virtual mechanics. virtual
In the old sense; this Is how It might as well
be working. In the anthropological sense this
la a "functional" analysis, showing the tie-ins
rather than the actual detailed thought processes
that occur And even if these are really the
mechanics, perhaps IBM doesn't mean them lo be
It might Jual somehow be a continuous accident.
A. Interconnection and compatibilities .
IBM acta aa If it does not want competitors
lo be able to connect thair accessor let to its
computers It's as though GM could design the
roads so •• to prevent the paasage of other
vehicles than Ita own.
Thia is dona several ways. First, IBM
has sometimes used contractual techniques to
prevent such interconnections lo Its systems,
either forbidding other things to be attached
(or et least slapping on extra service charge*
if they erel. or declaring lhat it would not
be responsible (or overall performance of such
s setup, effectively withdrawing the hardware
luerante* that la such a strong selling point
Secondly IBM doe* not tell all lhat need*
to tft known in order to make these intercon¬
nections-- the details of the hardware Interfaces
Finally, IBM can eunply decree , perhaps
claiming technical necessity, that Interconnection
ia Impossible. For Instance. IBM said for a
Thus the Telex Decision of September 17,
1973, in which it was decreed by the judge that
IBM would have to supply complete interface
information promptly when introducing a new
computer, was a source of great jubilation in
the computer field. However, lhat part of the
judgment has since been cancelled.
Much the same problem exists In the soft¬
ware area. IBM Is less than interested in
helping its competitors write programs that hook
up to IBM program*, so the details of program
hookup are not always made clear Here. too.
many smeller companies Insist they should be
made lo do it.
B Control and guidance of what the customer
To ■ remarkable degree, if you are an
IBM customer, you practically have to buy what
they tall you. This IBM manages by an intri¬
cate system of fluctuating degrees of sales and
support and contractual dealing . The IBM cus¬
tomer always has several options, but these are
like forced cards. IBM la always Introducing
and discontinuing products, and changing prices
and contractual arrangements and software op¬
tions in an elaborate choreography, which applies
calculated pressures on the customer. IBM hes
a finely-tuned system of customer incentives by
which It controls product phasing, to use the
polite term, or planned obsolescence, aa some
people cell it.
(Ryal R. Poppa, president of Pertec Corp..
predicts that IBM customers will now be re¬
quired to switch over lo new products every
five or six years, rather than every seven,
which Poppa contends has been the figure.
("Poppa Sees Several IBM Changes." Computer -
world . 21 Nov 73. 29.)
Programs, especially, are available with
different degress of approval from IBM The
technique of "support" Is the concrete manifes¬
tation of approval. A supported program la
one which IBM promises to lix when bugs turn
up. With an unsupported program, you're on
your own. Cod has forgotten you. Because so
much of IBM'* virtue lies In tha strength end
fervor of ita support, the use of unsupported
programs, or unsupported features of supported
programs, is a difficult and risky mailer, like
driving without a map and a spare tire, or even
Availability of products is in general a
matter of exquisite degree. It's not so much
that you can or can't get a particular thing,
but that the pricing and available contracts at
a given time fieri strong pressure to put you
where they have chosen within their currently
featured product line. Moreover, extremely
strong hints are always available; the salesman
wilt tell you whet model of their computers Is
likely to be a dead end, or. on the other hand,
what model is likely to offer various options
and progressive developments in the near future.
Effectively the IBM customer tends to be
frequently trapped in a cage of restrictions,
whether thla cage Is intentionally created by
IBM or not One is reminded of the motto of
T.H. White's anthill in The Once and Future King
THAT WHICH IS NOT FORBIDDEN IS COMPULSORY
The degree to which theae restrictions are
manipulated or intentional is. of course, a matter
of debate.
Some things are half-available, either as
"RPQa" (an IBM term lor special orders--
Raquaet Price Quotation), or available to
sophisticated customers at IBM's discretion.
With all the degrees of availability. It is
easy for IBM to open or close by degrees
various avenues in which customere are inter¬
ested .
D. Captive bureaucracies running in place?
Perhaps lhe most unfortunate thing about
IBM (from an outsider's point of view) is lhat
effectively their systems can only be used by
bureaucracies whom ihey have trelned. From
keypunch operator up lo installation manager,
all are effectively enslaved to curious complex¬
ities that keep changing The ever-changing
ver that IBM's game, intentions]
keep things difficult end intricately
irlng that you can't get the program featu
ought to be able (o get unless you get s
buy opponents
mmersed in lhe
peculiarities of IBM systems, and busy keeping
up with mandatory changes, do not gel uppity.
They are too buty. end the Investment of their
lime and effort it loo high for them lo want to
What it boil* down to It that you. the
customer, have few genuine options, especially
if your firm is already committed to doing cer¬
tain things with a computer. And when IBM
brings out a new computer, the prices and
other Influences are exacungly calculated to
make mandatory the jump they have in mind to
the new model.
change.
Anti-IBM cynics nay that a lot of the
work involved in working with IBM computers
la self-generated, arising from lhe unnecessary
complexities of OS/36D. JCL, TCAM end *o on
But of couree that cannot be evaluated here.
PROSPECTS
(Thl* planning of customer transition*
doe* not always work. Whan the 370 was Intro¬
duced. for instance. IBM had In mind that com¬
panies with a certain size of 380 would trade up
to a bigger 370. In soma cases users traded
down to e mmal ler 370. which wes able lo do the
tame work for leas money, to the acute bother
of IBM )
C. Having to do things jual their way.
IBM ayatema and programs a re set up lo
do things in particular way* To a remarkable
degree, II I* difficult to ua* them in ways not
planned or approved by IBM. and difficult to
tie ayatema and programa together. Programs
and feature* which Lh* casual observer would
suppose ought to be compsnbl*. land not to bs.
For tome reason compatibility always lends to
These remark* should clarify the bleakness
of lh# prospect for men’s future among computer*
If IBM'a system of control reslly doe* work thla
way. and If II la going to go on doing «o Be¬
cause it meant lhe future that aome of ut hope
52
w e*He*or*
hi tit f«lA * i
g 1 ;-St-,S 8 «Ue c«.
ftwfcrM * JSijtf'W
% s^sfrw
E«* riMHj*
In Bleakest Mordor
gi;
af ue|| >«
MW df Uf M|
Gti*
fcio M**\* CVaw
Seeor.1, B}at»ke1
<S«>w Vk'tt
Or*}
W
"IBM." a* everyone knows, is the trade
mark ot the International Business Machines
Corporation, an immense company cantered in
Armonk. N.Y.. but extending to over a hundred
countries and employing well over a quarter of
a million people.
IBM dominates two Industries, computers
and electric typewriters.
To many people. IBM is synonymous with
computers. Some of the public, indeed, believes
them to be the only computer manufacturer.
In cameras and Him. there ia Kodak. In
automobiles, there la General Motors. And In
the computer field there is IBM.
IBM sells some 65 to 701 of all the com¬
puters and programs that are sold. In this res¬
pect. the balanced near-monopoly, they are like
Kodak and CM.
But there are important differences. £v-
everybody knows whst s earners Is. or an auto¬
mobile. But to many, If not most, people, a
computer la what IBM says it is.
The Importance of this firm, for good or
ill, cannot be overstated: whose legend la so
thick, whose slock prices hsve doubled end re¬
doubled. ten limes over, to its multibllllon-dollar
mass; whose seeding Infallibility-- at least, at
seen by outsiders-- have been the stuff of
legand. whose style has proliferated across the
world, a style which has in a way itself become
synonymous with "computers." whose name sym¬
bolizes for msny people-- remarksbiy, both
those who love it and those who hate it— the
New Age.
The rigidity associated in the public mind
with "the computer" may be related In some
deep way to this organization. As a corporation
they are used to designing systems that people
have to use in their jobs by flat, and thus thera
are few external limitations on the complications
to our lives thst IBM can create.
Many people mistake IBM for "Juat another
big company," and hare lies the danger. IBM's
position in the world is so extraordinary, so
carefully poised tat a result ol various anti¬
trust proceedings end preesutions) juei outside
of tots) monopoly of a vitally important and all-
penetrating Held, that much of what they do has
implications for all ol ua. Ralph Nader 1 a con¬
tention that Genera] Motors is too powerful to
function is an independent government surely
eppllea even more to IBM Generet Motors Is not
in a position to persuade the public thel every
car ha• to have ten wheels and a snowplow
IBM seems in some ways to hsve molded compu¬
ters In its own image, end then persuaded the
world that this is the way they have to be.
But IBM is deeply aeneluve. In its way,
to public relatione. and has woven an extensive
eystam ol political ties end legends (If not
mythology) which have kept It almoat completely
exempt from the critical attention of concerned
citizens.
Thus It If necessary here, simply as a
matter of covering the field at an introductory
level, to raise some questions and critic lams
that occur to people who ere concerned about
IBM IBM presumably will not mind having
these matters raised, their public-eplrited con¬
cern in eo many areas assures that when eome-
thlng eo publicly important ee the character of
their own power Is concerned, occasional
scrutiny should be welcome.
A FINE PROGRESSIVE CORPORATE CITIZEN
AND A WONDERFUL EMPLOYER
It Is Important to note Brat of all that IBM
is in many respects the very mode) of a gener¬
ous and dutiful corporate citizen. In "commun¬
ity relations," in donations to colleges and uni¬
versities, In generous release of the time of its
employees for charitable and civic undertakings,
it la almost certainly the most public-spirited
corporation in America, and perhaps on the
face of the earth.
They have bean generous sbout many
public Interest projects, from Braille transcrip¬
tion to donating photographers and facilities for
films on child development.
The corporation sponsor* worthwhile cul¬
tural events. "Don Quixote” with Rex Harrison
on TV wsb terrific. Katharine Hepburn's "Glass
Menagerie" was marvelous.
They treet their small suppliers honorably
and with great solicitude.
IBM's enlightenment and benevolence
toward its employees Is perhaps bayond that of
any company anywhere They have rigorously
upgraded the position of women and other minor¬
ity employees; the opportunities for women may
be greater there than anywhere else. They have
upgraded repair of their systems, at any level,
to white-collar status, and tool kits are disguised
as briefcases. This innovation, making a repair¬
man into a "field engineer," Is one of the clever¬
est public-relations and employment policies ever
instituted.
They are openhanded to employees who
want to run for office, evidently regardless of
platform. In the sixties there were peace candi¬
dates who worked for IBM. and evidently got
time off for it. More recently. Fran Youngsteln.
an IBM marketing instructor, was a 1973 candi¬
date for Mayor of New York on the ticket of the
Free Libertarian Party, opposing all laws against
victimless crimes (e.g. prostitution and odd sex),
as well as Day Care and welfare.
TH£ &00>> AKlD
First , the good news
They offer msny computor pro¬
grams for ■ variety of purposes.
A company or governmental agency
can get immense amounts of "help"
and "information" from IBM. which
offers free courses, even IBM
people on "released time" to look
over the problem* on the premises.
IBM offers various kinds of com¬
patibility among its systems.
*!ewr fteoor i5*\
Now for the bad news ..
These programs are not necesearlly
set up the way you would wsnt them.
(But If you take the trouble to adapt
to them, you'll probably never get
back.)
The programs favor card or
card-Uke Input and. to date, strongly
discourage tlme-shsrlng and widespread
convenient terminal usa by untrained
people.
IBM programs are also notoriously
Inefficient, (That way you hsve to use
bigger machines for longer )
The courses indoctrinate with the IBM
outlook, and the planted people spread
It. Moreover, both mechanisms help
IBM spot the people they can work with
to make a big sale-- and [It Is alleged
by some) those who stand in (he wty.
It always seems to cost extra.
IBM equipment Is rugged and
durable, and their repairmen
or "field engineers" struggle
with great diligence and alacrity
to keep it running You may not like the way it runs.
They also rarely fire people. Once you're
in. and within certain broad outlines, it's ex¬
tremely safe employment. For those who turn
out not to fit In well, they have a tradition of
certain gentle pressure-practices like moving
you around the country repeatedly at IBM ex¬
pense. This encourages leaving, but also ex¬
poses the less-wanted employee to a variety of
opportunities he might not otherwise see. without
the trauma and anxiety of dismissal.
(It is said that there are IBM firings, but
they are rare and formidable. Heywood Gould's
description of an IBM firing ( Corporation Freak ,
pp. 113-115). for which he does not claim au¬
thenticity, is nevertheless bloodcurdling.)
IBM's International manners (in its 115
countries) are likewise praiseworthy. Compared
to the perfidious behavior of some of our other
multinational corporations, they are sweetness
and light and highschool civics. Sensitive to
the feelings of people abroad, they are said to
operate carefully within arrangements made to
satisfy each country. They tram nationals for
real corporate responsibility rather than bringing
in only outside people. And they are sensitive
to issues for instance, they recently refused to
set up an Apartheid computer in South Africa.
ONE THING IS PERFECTLY CLEAR:
IBM has no monopoly on understanding or sophistication.
THEN WHY SUCH A RANGE OF FEELINGS
TOWARD IBM?
Among computer people, feelings toward
IBM range from worship to furious hale (depen¬
ding only in part on whether you work there) .
Many, many are of course employed by
IBM. and the devotion with which they embrace
the corporation and its spirit is a wonder of the
1. SOCIAL ASPECTS OF IBM .
It is perhaps in the social realm, including
its Ideological character, that a lot of people
are turned off by IBM.
IBM ha* traditionally been the paternalistic
corporation. (Paternalistic corporations were
some kind of big philosophical issue to people
In the fifties, but nobody cares anymore. Anyway,
the rest were perhaps inconsequential compared
to IBM.) Big IBM towns not only have a Country
Club (no booze). but a Homestead for the comfort
of important corporate guests. There are dress
codes (although non-white shirts and below-the-
collar hair are now allowed) , and yes. codes
o( private behavior (now subdued) . These irritate
people with libertarian concerns. They do not
bother employees, evidently, because employees
knew what they were getting into.
Generalizations about IBM people obviously
cannot be very strong. Obviously there is going
to be immense variation among 26S.000 people,
half of whom have college degrees; but of course
one of the great truths of sociology Is that any
non-random group haa tendencies.
More than that In this case. In a way IBM
people are an ethnic group. Impressive indeed
are the general energy and singlemindedness
ot the people, galvanized by their certainty that
IBM is true, good and right, and that the IBM
way is the way. This righteousness is of course
a big turn-off for a lot of people. Perhaps It
leads in turn to the most-heard slurs about IBM
people, that they are brainwashed or provincial.
I$M dW<JT€iej- Wh (Ml let
But the spiritual community of IBM extends
further. Upper-management types. especially
Chairmen of Boards and comptrollers, seem to
have a reverence for IBM that is not of this
world, tome amalgamated vision which entwines
images of eternal stock and dividend growth
with an Idealized notion of management efficiency.
Many others use and live with IBM's equipment,
and view IBM as anything from "the greatest
company in the world" to "a fact of life" or even
"a necessary evil." In some places whole colo¬
nies of users mold themselves in its image, so
that around IBM computers there are many "Uttla
IBMs. “ full of people who imitate the personali¬
ties and style of IBM people. (RCA. before Its
computer operation fell to pieces. Imitated not
Just the design of IBM's 3G0 computer, but a
whole range of title* and departmental names
from out of IBM. The smeerest form of flattery.)
But outside Ihla pale-- beyond the spiri¬
tual community ol IBM-- there are quite a few
other computer people Some simply Ignore IBM.
being concerned with their own stuff Some
like IBM but happen to be elsewhere. Others
dislike or beta IBM for a variety of reasons,
business and social. And this smoldering
hatred 1* surely far different In character from
anybody's attituds toward Kodak or GM.
While it i* nut the Intent here to da any
kind of an anU-IBM number, it la neverthalas*
necessary to sllempt to round out the one-sided
picture that ia projected outside the computer
world. In what follow* there ia no room to try
to give a balanced picture. Because IBM can
apeak (or Itself, and does so with many volcaa.
It la more important to indlcets hers the kinds
at criticisms which ere commonly made of IBM
by sophisticated people within the industry, so
that IBM-worshipers will have some idea of what
bother* people. But of course no attempt can
be mad* here to judge these milters, this is
Just intended *e source material (or concerned
citizens
1950s (TUBES)
650 (DecimalJ 700 Series
701
702 (decimal) v
^ \l
70S (decimal) 704 (36 bit*)
EAHLY i960*
(TRANSISTORS!)
\
7070
7
7040
s
7090
1620
7074
7044
7094
(decimal
mlnlcom puter)
/
1400 senes (decimal.
/ STRETCH
accounting -or tented)
/ (64 bite)
1401. 1410.
Ne_
1
/ '
MID-1960S
(INTEGRATED
CIRCUITS]
310 Series
(32-bit *■ well ai decimal)
20. 25. 30. 40. 44. 50. 65. 67,
| 75. 65. 90. 91 .
1970a
("MEDIUM-SCALE
INTEGRATION")
(Variable)
Sye(em 7
(16 bits)
370 Serial
125. 135. 145. 155, 165. 156. 195.
The asm* elfck marketing could be tpplled to any other industry .
Bui It wouldn't be IBM Nowhere elec could the mystery of the subject
be mat end enhanced with so many more mysteries.
51
||oUJ (SM*)
£o**mt*
h*& Ft*MCti>-
a ftR?pcdt'^e
Those of us who were around will never
forget the Days of Madness (1968-9). Computer
stocks were booming, and their buyers didn't
know what it was about; but everywhere there
were financial people trying to back new com¬
puter companies, and everywhere the smart
computer people who'd missed out on Getting
Theirs were looking for a deal.
Datama tion for November 1969 was an inch
thick. there were that many ads for computers
and accessories.
At the Fall Joint Computer Conference that
year in Las Vega6, I had to cover the highlights
of the exhibits in a hurry, and it took me all
afternoon, much of it practically at a trot. Then,
after closing time, I found out there had been
a whole other building .
It is important to look at how a lot of these
companies were backed, the better to understand
how irrationality bloomed in the system, and
made the collapse of the speculative stocks in
1970 quite inevitable.
It was very difficult to talk to these people,
jarticularly if you were trying to get support for
a legitimate enterprise built around unusual ideas.
(Everybody wants to be second .) And what's
worse, they tended to have that most reprehen¬
sible quality: they wouldn't listen . Did they
want to hear what your idea actually was ? 'Til
get my technical people to evaluate it"-- and
they send over Joe who once took COBOL. 1
finally figured out that such people are impossible
to talk to if you're sincere-- it's a quality they
find unfamiliar and threatening. I don't think
there's any way a person with a genuine idea
can communicate with such Wheeler-Dealers;
they just fix you with a piercing glance and say
"Yeah, but are we talking about hardware or
software?" (the two words they know in the
field).
A number of companies were started at
the initiative pi people who knew what they were
doing and had a clear idea, a new technique or
a good marketing slant. These were in the
minority, I fear.
More common were companies started at
the initiative of somebody who wanted to start
"another X"— another minicomputer company,
another terminal company, expecting the product
somehow to be satisfactory when thrown together
by hired help. Perhaps these people saw com¬
puter companies as something like gold mines,
putting out a common product with interchangeable
commodity value.
The deal, as some of these Wall St. hangers-
on would explain it, was most intriguing. Their
idea was to create a computer company on low
capital, "bring it public" (get clearance from the
SEC to sell stock publicly) , and then make a
killing as the sheep bought it and the price went
up. Then, if you could get a "track record"
based on a few fast sales, the increasing price
of your stock (these are the days of madness,
remember) makes it possible to buy up other
companies and become a conglomerate.
1*+" so* c
t &
. . cO* 9
, v®**
V* i
k *
“ITS A WHEELER I"
The joker is that if you missed out on all
this you were much better off. Anyone with a
genuine idea is being set up for two fleecings:
the first big one, when they tell you your ideas,
skills and long-term indenture are worth 2J%
(if you're lucky) compared to their immense con¬
tributions of "business knowhow," and the second,
when you go public and the underwriter gets
vast rakeoffs for his incomparable services. What
is most likely to get lost in all this is any orig¬
inal or structured contribution to the world that
the company was intended, in your mind, to
achieve.
This is all the sadder because the com¬
panies that achieve important things in this field,
as far as I can see, are those with a unifying
idea, carried out unstintingly by the man or
men who believe in it. I think of Olsen’s Digital
Equipment Corporation, Data General, Evans and
Sutherland Computer Corporation, Vector General.
This is not to say that a good idea succeeds
without good management or good breaks: for
instance, Viatron, a firm which was the darling
of the computer high-flying stocks, had a per¬
fectly sound idea, if not a deep one: to produce
a video terminal that could be sold for as little
as $100 a month. But they got overextended,
and had manufacturing troubles, and that was
that. (You can now get a video terminal for
$49 a month, the Hazeltine.) Of course, a lot
of ideas are hard to evaluate. A man named
Ovshinsky, for instance, named a whole new
branch of electronics after himself ("ovonics"),
and claimed it would make integrated circuits
cheaper or better than anybody else's. Scoff,
scoff. Now Ovshinsky has had the last laugh:
what he discovered some now call "amorphous
semiconductor technology," and his circuits are
being used by manufacturers of computer equip¬
ment. Another example is one Frank Marchuk,
whose "laser computer" was announced several
years ago but hasn't been seen yet. Many com¬
puter people are understandably skeptical.
This is still a field where individuals can
have a profound influence. But the wrong way
to try it is through conventional corporate fin¬
ancing. Get your own computer, do it in a
garret, and then talk about ways of getting it
out to the world.
BIBLIOGRAPHY
John Brooks, The Go-Go Years . Weybright
k Talley. $10.
¥•«, it*B real.
Life inirates art
on Route 46, N.J.
In part this is because anyone with tech¬
nical knowledge is apparently labelled Silly
Technician in the financial community, or impos¬
sible Dreamer; it is entrenched doctrine among
many people there that the man with the original
idea cannot be allowed to control the direction
of the resulting company. In one case known
to me, a man had a beautiful invention (not
electronic) that could have deeply improved
American industry. It was inexpensive, simple
to manufacture, profoundly effective. He made
his deal and the company was started, under
his direction. But it was a trick. When the
second installment of financing came due (not
the second round . mind you), the backers
called for a new deal, and he was skewered.
Result: no sales, no effect on the world, no
nothing to speak of.
/}<X 0 W
I s goufr^r ^Ij) jeep
For Ihe most part. h»*r computers have
always been rented or Irased. rather than
bought outright. There are various reasons for
this. From the customer’s point of view, it
makes the whole thing tax-deductible without
amortisation problems, and means that it’s pos¬
sible to change part of the package - the model
of computer or the accessories- more easily.
And big amounts of money don't have to be
shelled out at once.
From the manufacturer’* point of view (and
of courac we arc apeaking mostly of IBM), It Is
advantageous to work the leasing game for
several reasons. Cash inflow is steady. The
manufacturer la In continuous communication
with the customer, and has his ear for changes
and improvements costing more. Competitors
are at a disadvantage because the immense
capital baae needed to get into the selling-and-
leaalng game makes competitition impossible.
Basically. leasing really may be thought
of as having two parts: the sale of the computer,
and banking a loan on it: essentially Ihr lease
payments arc Installment payments, and the real
profits come sfter the customer has effectively
paid the real purchase price and is still forking
over.
Many firms other than IBM prefer to sell
their computers outright. Minicomputers are
almost always sold rather than rented. However,
for those who believe in renting or leasing, the
so-called "leasing firms" hsve appeared, effec¬
tively performing s banking function. They buy
the computer, you rent or lease it from them,
and they make the money you would've saved
if you'd bought.
IBM. now required lo sell its computers
as well as lesse them, keeps making changes
in ils systems which cynics think are done partly
to scare companies away from leasing, since
if you've bought the computer you can't catch up.
(Large computers bought from companies that
like (o sell them, such as DEC and CDC. do not
seem to have this problem.)
wt«, MTEMW
a practical probles of immense importance is "maintenance."
meaning repair and upkeep of computers and their accessories.
Lots of guys in Boston ond L.A, are having fun making computers,
but here you are stuck in Squeedunk and it doesn't work anymore.
Trying to find people who will fix these things on a stable
basis i* a great problem.
You can sign a "maintenance contract" with the sunufacturer,
which is sort of like breakdown insurance: whatever happen*
he'll fix. Eventually . If you own aquipnant from dlfferant
manufacturers, though. It's worse-, each manufacturer will only
contract to fix his own equipment. (And remember, interfaces
hsve to be maintained too.)
This is ths biggest point in favor of IBM. Their maintenance is
superb.
There's aleo something called third-party maintenance: companies
who'll contract to keep all your hardware-working. RCA and
Raytheon are into that.
SOFTWARE
Computer programs, or "software." used
10 come fr<c with the computer. But IBM turned
around and "unbundled," meaning you had lo
buy It separately, and there has been some fol¬
lowing of this example. However, for users who
are buying a computer with some canned program
for a particular purpose, prices are obviously
for the whole package: it'a people who use the
same computer for a lot of different things that
have to pay for individual programs.
There are many smell software companies.
For the cost of a letterhead anyone can alert one;
the question is whether he has anything special
lo sell. Some people whomp up programs on
their own which turn out to be quite useful.
(For instance, one Benjamin Pitman offers a
magnificent program in Fortran to generate tex¬
tual garbage. It's so good it can be used lo
expand proposals by hundreds of pages. He
calls it Simplified Integrated Modular Prose (SIMP)
and it sells for $10. His address is Computer
Center, University of Georgia, Athens GA 30602?)
Obviously, to create big systems for intri¬
cate management purposes requires a great deal
more effort. Traditionally these are done by
vast programmer teams working in COBOL or
the like, constantly fighting wiih monitor programs
and chewing up millions of dollars. However,
the new Quickie Languages (three shown pp. ((-£$)
may offer great simplification of such programming-
tasks.
Programs ore protected by copyright--
that's the only way there con be a software in¬
dustry at all-- but since there has been no
court litigation in Hie field, nobody knows what
the Iaw really is or what it covers. Everybody
agrees that traditional copyright precedent covers
a lot of ground-- "derivative works" definitely
violate copyright, even study guides to textbooks--
-- but no one knows how far this goes.
Same for patents. The Patent Office has
granted program patenls, notably the one on
the sorting program of Applied Data Research,
Inc., but The Patent Office has a profound dis¬
taste for this potential extension of ils duties,
and is Idling everyone that programs aren't
patentable, even though they clearly fall within
its mandate as unique, original processes.
People who only read the headlines thick
thal the Supreme Court struck down the patent¬
ability of programs. No such thing.
USED COMPUTERS
While In principle there would seem to be
every advantage in buying used computers, there
are certain drawback*. Service is the main one:
the manufacturer is not very helpful about fixing
discontinued machines, and you may have to know
how to do it yourself. Even with machines still
available, you may have trouble getting onto a
servfce contract from the manufacturer, since
It "may have been mistreated." (American Uaed
Computer, in Boaton, will usually guarantee
that its merchandise wiU be accepted back into
manufacturer's contract service.) A final draw¬
back i* price: a popular machine may coat aa
much used as new, since they're saving you the
waiting period.
It's kind of unfortunate: otherwise usable
machines get wasted. (Bui here's waste for
you: certain well-known laboratories, owned by
a profit-making monopoly, smash their used com¬
puters If nobody wants them within the lab.
They claim they can't resell them because they
would then be "competing" with the manufacturers.
1 wish thF conservationists would get on that one.)
(Notes from all over: il seems that all the
surviving number* of the Philco computer, a nice
machine but very much discontinued, have ei¬
ther gone to the state of Israel or to Pratt Insti¬
tute in Brooklyn. When 1 spoke at Pratt they
showed me their Philco machines, chugging heal¬
thily. and said they had (I think) some four more
Philcos in crates , donated by their original owners.)
ANNOUNCEMENTS
An eccentric aspect of the computer field
is the Announcement. Ihe statement by a company
(or even individual) that he is planning lo make
or sell a certain computer or program. Some
very odd things happen with announcements in
this field. (None of this is unique lo computer¬
dom, but it goes to unusual extremes here.)
Under our system it is permissible for any
person or firm to announce that he will make or
sell any particular thing, and even if he's lying
through his teeth, it’s not ordinarily considered
fraud unless money changes hands. Talk is
cheap. Thus il ia common practice in American
industry for people to say that they will soon
be selling hundred-mile-an-hour automobiles,
tapioca-powered rocketships. antigravity belts.
Okay. In the computer world the same
thing happens. The strategy depends on the
announcer's market position. The little guys
are often bluffing wistfully, hoping someone will
get interested enough lo put up the money to
finish the project, or the like; the big companies
are often "testing the water." looking to see
whether there sre potential customers for what
they haven't even attempted to develop. Announce¬
ments by big companies also have strategic value:
if they announce something a smaller guy has
already announced, they may cut him off at Ihe
pass, even though they have no intention of
delivering. That's just one example. The anal¬
ysis of IBM's announcements is a parlor game
in Hie field. It has been alleged, for instance,
that IBM announced its 360 computer long before
it was ready to cut off incurs ions on its cus¬
tomers by other firms; Control Dais, in a recent
suit, alleged that the Model 90 number* of the
360 were announced, and then developed, simply
to destroy Control Data and its own big fast
machines. These are just examples.
In olher words, caveat auditor ■
THE SEVEN DWARVES AND THEIR FRIENDS
The computer companies arc often
called "Snow White and the Seven Dwarves,"
even though the seven keep changing. Here
are some main ones beside IRM. 1 hope I
haven't left anyone out.
Requieacanl in Pace :
Sperry Rand Univac General Electric
Honeywell <«°M out to Honeywell)
Burroughs RCA (sold out to Univac)
Control Data Corporation (CDC) Philco
National Cash Register (NCR) General Poods
Digital Equipment Corporation (DEC) * others beyond recollection
Xerox Data Systems (XDS; formerly
Scientific Data Syitems (SDS))
Hewlett-Packard (HP)
Data General
Interdata, Inc.
Vartan Data Machines
Lockheed
In this light the patents that the University
of Utah has gotten on (he halftone imago synthesis
programs of Warnock and Wylie and Romney (sec
p. ) are of considerable interest. These
patents use the "software-aa-hardware" ruse: the
program is described in detail aa taking place in
a fictitious machine shown in many detailed draw¬
ings whose nebulous character la not readily
acen by the uninitiated: events vaguely taking
place in "microprogrammable microprocessors"
have been neatly foisted on the Patent Office as
detailed technical disclosure. It’s a great game.
The idea is that the claims are so drawn as to
cover not just the fictitious machine, but any
program that should happen to work the same
way. But such approaches, though common to
previous,, patent practices, have not yet been
litigated in this, field.
Datamation ran several good articles on
buying computer stuff in it* Septem¬
ber. 15. 1970 issue.
"Software Buying" by Howard
Bromberg (35-40) and "Contract
Caveats" by Robert P. Bigelow (41-
44 ) are very helpful warnings about
not getting burned.
Another. "Project Management
Games." by Werner W. Leutert <24-
34 ) ia an absolutely brilliant, blood¬
curdling strategic analysis of the
ploy* and dangers involved in buy¬
ing and selling very expensive things,
such as computer* and software.
ANYONE INVOLVED IN COMPUTER
MANAGEMENT SHOULD READ THIS
MACHIAVELUAN PIECE WITH THE
GREATEST CARE. Anyone interes¬
ted In the theory of showdown and
negotiation can read it with a differ¬
ent slant.
.,4rh p co
occupy UV
lt t.4
meat W * u»«*
« lltU * ,no
. eanAO.
.-iE 4 * ck ‘
Santa t
Ahova
-*
. _
n U*te4 pto4uc
c/o Coapuicch System
1819 Peachtree Id.,
Atlanta CA 30309.
rn Ki ; »IU f>
- 4vr
S<J RVlVftt MTHC PTTCST
One of the stranger projects of the sixties was a game
played by the most illustrious programmers at a well-known
place of research; the place cannot be named here, nor
the true name of the project, because funds were obtained
through sober channels, and those who approved were
unaware of the true nature of the project, a game we shall
call SURFIT ("SURvival of the FITtest".) Every day after
lunch the guys would solemnly deliver their programs and
see who won. It was a sort of analogy to biological evolution.
The programs would attack each other, and the survivors
would multiply until only pne was left.
It worked like this. Core memory was divided up
into "pensone for each programmer, plus an area for
the monitor.
1
7Z
a*\i
*Ki*\*|
22
Vs S S y
////
/ i _
jwrr K\omrc><?
Each program, or "animal," could be loaded anywhere
in its pen. The other programs knew the size of the pen
but not where the animal was in it. Under supervision
of the special monitor, the animals could by turns bite
into the other pens, meaning that the contents of core at
several consecutive locations in the other pen was brought
back, and changed to zero in its original pen.
Your animal could then "digest"— that is, analyze—
the contents bitten. Then the other animal got his turn.
If he was still alive— that is, if the program could still
function— it could stay in play; otherwise the animal who
had bitten it to death could multiply itself into the other
pen.
The winner was the guy whose animal occupied all
pens at the end of the run. If he won several times in a
row he had to reveal how his program worked.
As the game went on, more and more sophistication
was poured into the analytic routines, whereby the animal
analyzed the program that was its victim; so the programmer
could attack better next time. The programs got bigger
and bigger.
Finally the game came to a close. A creature emerged
who could not be beaten. The programmer had reinvented
the germ. His winning creature was all teeth , with no
diagnostic routines; and the first thing it did was multiply
itself through the entirety of its own pen, assuring that
no matter where it might just have been bitten, it would
survive.
OTY&K.
m. m
MTOt Kill.
C.ANWOT J0*V|V6,
P/X"
UiuNlMO
c o *“plet*_ ok.tJj
arre*. *nx
m m i 11
frFTltt
□ 11 m i n
When word got around that this nude was in a public file on the
time-sharing system, my office-mates scrambled to get printouts of her.
The cleverest, though, had a deck punched . As he predicted, she was
thrown off by the systems people within an hour or so-- leaving the other
guys with their printouts, but he had the deck. Now he can put her
back in the computer any time, but they can't.
n
l l
: i |
-s
i
it
n
£
i “
it
ill
Twitting a program within its own premises
is a jolly aspect of computer fun. This game of
three-dimensional tic-tac-toe was played with a
program running on a minicomputer at the Spring
Joint, 1969. CAUTION--ADULTS ONLY. ®
While this example may offend some people,
it vividly showB how programs may be toyed with
-- in this case, by the mischievous sign-on--
to make them behave humorously.
X
s
5
i
1. THE PHANTOM STRIKES
ts
C^M0TtiL_
All kind* of dumb Jokes and cartoons circulate among
the public about computers. Then our friends regale us
contputerfolk with these Jokes and cartoons, and because
we don't laugh they say we have no sense of humor.
Oh we do. we do. But what we laugh at ie rather
more complicated, and relates to what we think of as the
real structure of things.
Some of the best humor in the field is run in Datamation ;
an anthology called Faith . Hope and Parity reran a lot of
their best pieces from the early sixties. Classic was the
Kludge aeries, a romp describing various activities and
products of the Kludge Komputer Korporation, whose foibles
distilled many of the more idiotic things that have been
done in the field. ("Kludge," pronounced "kloojis a
computerman's term for a ridiculous machine.) Datamation’s
humorous tradition has continued in a ponderous but extremely
funny serial that ran in '72 called Also Sprach von Neumann .
which in mellifluous and elliptical euphemisms described
the author's adventures at the "airship foundry" and other
confused companies that had him doing one preposterous
thing with computers after another.
(ioKtoTE^mviia
Pranks are an important branch of humor in the field.
Here are some that will give you a sense of it.
ZAP THE 94
One of the meaner pranks was a program that ran
on the old 7094. It could fit on one card (in binary), and
put the computer in an inescapable loop. Unfortunately
the usual "STOP" button was disabled by this program,
so to stop the program one would eventually have to pul)
the big emergency button. This burnt out all the main
registers.
TIMES SQUARE LIGHTS
One of the weirder programs was the operator-waker-
upper somebody wrote for the 7094. It was a big program,
and what it did was DISPLAY ALPHABETICAL MESSAGES
ON THE CONSOLE LIGHTS. sliding past like the news in
Times Square. You put in this program and followed It
with the message; the computer’s console board would light
up and the news would go by. Since the lights usually
blink in uninteresting patterns, this was very startling.
This program was extremely complex. Since the
94 displayed the contents of all main registers and trap,
arithmetic and overflow lights, it was necessary to do very
weird things in the program to turn these lights on and
off at the right times.
THE TIME-WASTER
In one company, for some reason, it was arranged
that large and long-running programs had priority over
abort quick ones. Very well: someone wrote a counterattack
program occuping several boxes of punch cards, to which
you added the short program you really wanted run, and
a card specifying how long you wanted the first part of
the program to grind before your real one actually started.
This would blink lights and spin tapes impressively
and lengthen the run of your program to whatever' you wanted.
BOMBING THE TIME SHARE
One of the classic bad-boy pranks is to bomb time¬
sharing systems-- that la, foul them up and bring them to
a halt. Many programmers have done this; one has told
me it's a wonderful way to get rid of your aggressions.
Of course. it can damage other people's work (eepeclally
If disks are bombed); and it alwaye gats the system program¬
mers hopping mad, because it means you've defied their
authority and maybe found a hole they don't know about.
Here are a couple of examole*.
The way this story is told, one of the time-sharing
systems at MIT would go down at completely mysterious
times, with all of core and disk being wiped out. and
the lineprinter printing out THE PHANTOM STRIKES.
For a long time the guilty program could not be
found. Finally it was discovered that the bomb was
hidden in an old and venerable statistics program
previously believed to be completely reliable. The
reason the phantom didn’t always strike was that the
Bomb part queried the system clock and made a pseudo¬
random decision whether to bomb the system depending
on the instantaneous setting of the clock. This is why
it took so long to discover; the program usually bided
Its time and behaved properly.
Apparently this was the revenge of a disgruntled
programmer, long since departed. Not only that, but
his revenge was thorough: the Bomb part of the program
was totally knifed into the rest of it, it was a very
important program that had to be run a lot with different
data, end no documentation existed, making it for
practical purposes impossible to change.
The final solution, so the story goes, was this:
whenever the rowdy program had to be run, the rest
of the machine was cleared or put on protect. so it ran
and had its fits in majestic solitude.
2. RHBOMB
The time-share at the Labs, never mind which
Labs, kept going down. Mischief was suspected. Mis¬
chief was verified: a program called RHBOMB. sub¬
mitted by a certain programmer with the initials R.H.,
was responsible, and turned out always to be present
when the terminals printed TSS HAS GONE DOWN. It
was verified by the systems people that the program
celled RHBOMB was in fact a Bomb program, with no
other purpose than to take down the time-sharing system.
R.H. was spoken to sternly and it did not hap¬
pen again.
However, some months later a snoopy systems
programmer noted that a file called RHBOMB had been
stored on disk. Rather than have R.H. scalped pre¬
maturely. he thought he would check the contents.
He sat down at the terminal and typed in the com¬
mand, PRINT RHBOMB. But before he could see its
contents, the terminal typed instead
TSS HAS GONE DOWN
But this was incredible! A program so virulent that
if you just tried to read its contents , without running
it, it still bombed the system! The systems man
rushed from the room to see what had gone wrong.
He did so prematurely. The contents of the
new file RHBOMB were simply
TSS HAS GONE DOWN
followed by thousands of null codes, which were sil¬
ently being fed to the Teletype, 10 per second, pre¬
venting it from signalling that it was ready for the
next thing.
Owl* Gw of m
A Grand Fad among computerfolk in the last couple
of years has been the game of "Life,” invented by John
Horton Conway.
The rates appeared in the Scientific American in
October 1970, in Martin Gardner's games column, and the
whole country went wild . Gardner was swamped with
results (many published in Feb. 71); after a couple more
issues Gardner washed his hands of it, and It goes on
in its own magazine .
The game is a strange model of evolution, natural
selection, quantum mechanics or pretty much whatever
else you want to see in it. Part of its initial fascination
was that Conway didn't know its long-term outcomes, and
held a contest (eventually won by a group from MIT).
The rules are deceptively simple: suppose you have
a big checkerboard. Each cell has eight neighbors: the
cells next to It up, down and diagonally.
Time flows in the game by "generations." The pattern
on the board in each generation determines the pattern
on the board in the next generation. The game part simply
consists of trying out new patterns and seeing what things
result in the generations after it. Each cell is either OCCUPIED
or EMPTY . A cell becomes occupied (or "is born") if exactly
three of its neighbors were full in the previous generation.
A cell stays occupied if either two or three of its neighbors
were occupied in the previous generation. All other cells
become empty ("die").
These rules have the following general effect: patterns
you make will change, repeat, grow, disappear in wild
combinations. Some patterns move across the screen in
succeeding generations ("gliders”). Other patterns pulsate
strangely and eject gliders repetitively (glider guns).
Some patterns crash together in ways that produce moving
glider guns. Weird.
While the game of Life, as you can see from the rules,
has nothing to do with computers intrinsically, obviously
computers are the only way to try out complex patterns
in a reasonable length of time.
qj?
oqo -* □ -* Qoa \fr)
§§ -*SS fiw?
V
□ an
>o £
aa
a
NON-OBVIOUS RESULTS OF SOME SIMPLE PATTERNS:
some die. one blinks back and forth, others become stable.
(Conway's Game of Life programmed for PLATO by Danny Sleator.)
Games with computer programs are universally enjoyed
in the computer community . Wherever there are graphic
displays there ia usually a version of the game Spacewar.
(flee Steward Brand's Spacewar piece in Rolling Stone ,
mentioned elsewhere.) Spacewar. like many other computer-
based games, is played between people , using the computer
as an animated board which can work out the reaulta of
complex rules.
Some installations have computer games you can play
a gain at ; you are effectively "playing against the house,"
trying to outfox a program. Thia ia rarely eaay . A variety
of techniques, hidden from you, can be used.
When "a computer" plays a game, actually somebody's
program la carrying out a set of rules that the programmer
has laid out In advance. The program has a natural edge;
it can check a much longer serlea of possibilities In looking
for the best move (according to the criteria in the program).
There la • more complicated approach: the computer
can be programmed to test for the best strategy in a game.
This is much more complicated, and is ordinarily considered
an example of "artificial intelligence” (see ”The God-Builders,"
eleewhere in thia book) .
BIBLIOGRAPHY
Donpld D. Spencer, Game Playing with Combers.
(Spartan/Hayden. $13.) This includes flow¬
charts, programs and what-have-you for some
25 games, and suggestions for more.
A continuing scries of game programs (mostly or
all in BASIC) appears in PCC. a newspaper
mentioned earlier.
Stewart Brand's msrvelous Spacewar piece, also
mentioned earlier, ia highly recommended.
*rt C. Ganwill, "hn examination of Tlc-T*c-Toe-
llkn Ganme." Proc. NCC 74 , 349 - 355 .
Examines structure of simple
(up, jo tic-tec-toe or CUBIC) where forced
ulna are possible* and pro<jra* structures to
play them.
( Lifeline , »ald to be published by Bobert T.
isinwriflht of Wilton, Connecticut.)
THMe M>0RM5ie
lUFORiMTNfr
Thrir name makes people think they're a mar protest fjroup.
but actually the R .E .S .1 .S .T .O .R .S . of Princeton , N .J. sre n
bunch of kids who play with computers. They're oil young; members
are purged when they finish high school. Their elubroom is at
Princeton University, but the initiative is strictly theirs.
The name stands for "Radically Emphatic Students Interested
In Science. Technology and Other Research Subjects." Computers
are not all they do--they've also gotten Into slot racing and the
game of Diplomacy— but computers are what they're known for.
The Resistors (let's spell ft the short way) exhibit regularly at
the computer conferences, and have startled numerous people
with the high quality of their work. They’ve been invited to various
conferences abroad. They have built various language processors
snd done graphics; lately their fad ia working with the LDS-I
in Princeton's Chemistry Department.
Stave
at the old
•traight S.
• *• '■»* -
•^4, *
Where do they learn it all? They leach each other, of course.
Newcomers hang around, learn computer talk, work on projects .
and tease each other. They also use the informal trade channels,
subscribing to magazines and filling out information request
cards under such company names as Plebney International Signal
Diviaion and Excalibur Wax Fruit.
The great thing about these kids ia their zany flippancy.
They've never failed, they’ve never been afraid for their jobs,
and so they combine the zest of the young with their expertise.
Their forms of expression arc as startling to professionals as
they are to outsiders: don't say anything ponderously if it can
be said playfully. Don’t Bay "bit field" if you can say "funny
bits;" don’t say "alphanumeric buffer" if you can say "quick brown
fox box; " don't say "interrupt signal" if you can call it a "Hey
Charlie; " don't say "readdressing logic” if you can say "whoopee
What's a
group Like you
Joint ILka this?
They have varied backgrounds. The father of one Is a butcher,
the father of another Is one of the country's foremost intellectuals
(None of that matters to the kids.) 1 have dined in a number ol
their homes, and find this in common: their parents show them
great respect, love and trust. Indeed, Resistor parents have
expressed some surprise to learn that their children's work Is
at the full-fledged professional level. The important thing, to
7.'. ,he parents, is that the kids arc working on constructing things
•** they enjoy.
R.B.S.I.S.T.O.ft.S.
after infamous
Onega ceremony.
The trade press is ambivalent toward the Resistors. On
the one hand they make good copy. (At one Spring Joint they
had the only working time-sharing demo-- on a carpel next to
a phone booth.) On the other, they sometimes seem brntty and
publicity-hungry . like many celebrities. (At another Spring
Joint they dug up an IBM Songbook and serenaded the guys ut
the IBM pavilion, who hud to act nice about it.) So they don't
get written up in computer magazines so much anymore.
I first met the Resistors in 1970. and started hanging around
with them for two reasons. First, they ore perfectly dclighirul:
enthusiastic in the way that most adults forego, and very witty.
To them computer talk was not a thing apart, us it is for both out¬
siders and many professionals.
Secondly, and this was the self-seeking aspect, I noted
that these kids were quite expert, and interested in giving me
advice where computer professionals would not. They got interested
in helping me with my (perhaps quixolic) Xanadu lm project (sec
flip side). This was enough to keep mo visiting for a couple of
years. Now. some people arc too proud lo ask children for informa-
lion. This is dumb. Information is where you find it.
The lost I heard, the Resistors were ut work in u COBOL
compiler for the Pl)l'-11. hoping it would save the local high school
from the disastrous (to them) purchase of on IBM 1130. (Since
the school's intent was lo teach business programming, ihcy hoped
that the ovuilability of COBOL would encourage the school to buy
the more powerful and less expensive PDP-11.)
The Resistors arc few, but I think they urc very important
in principle, on cxislcncc proor. They show how silly and tirlificial
is our edifice of pedagogy . with ull its sequences and sterilizations,
and how anybody can learn anything in the right atmosphere,
stripped of its pomposities. The Resistors arc not obsessed with
computers; their love of computers is part of their love of everything,
and everything is whut computers arc for.
R.«.iJ.T.o.iy. 1,7
__' W,U " n ' ,4 ‘ talkl "« ln an »'har girl at (he ACM 70 con¬
ference. A passerby heard her explaining the differences amon*
the languages BASIC. FORTRAN. COBOL and TRAC "HowTZ
h " M "■ -o".
wiitioujuury urnring u.
A x;:zr ,he *«**«
rigni right away,” Mid a
Since there was a lot ..t .-xc ss capacity . the Resistors got
t free account on ■ national lime-sharing system. Though they
didn't have to pay, the system kept them Informed on what they
would have owed. In a year or so they ran up funny-money bills
of several hundred thousand dollars.
Did they rate free subscriptions to computer magazines?
I asked. Could they claim they really "make decisions affecting
the purchase of computers"?
"Of course we do!" was the reply. "All together: shall
we buy a computer?"
Resistors (in unison) "NO!”
Their original advisor, whom we shall call Gascon, is mis¬
chievous in his own right. It was meeting-time at Gaston's place
on a bright Saturday, and I was on the fawn working on Xanadu
with Nat and Elliott when Gaston interrupted lo say that an unwelcome
salesman of burg lar alarms was about to arrive. "Let's have
a little fun with him." said Gaston. The kids were to be introduced
as Gaston's children, 1 was an uncle. We took our stations.
The salesman may have realized he was walking into a (rap
from all the strangely beaming adolescents that stood in the living
room. He got out his wares and started to demonstrate the burglar
alarm, but it didn't go right. Peter, standing in front of the equip¬
ment with a demonically vacuous grin, had reversed o diode behind
his back so that the alarm rang continuously unless you broke
the light beam.
"Humpf." said Gaston, "you went to see a real security
system?" We trooped into the kitchen, where Gaston kept * Teletype
running.
ANY NEWS? typed Gaston.
CREAM YELLOW BUICK PULLED INTO DRIVEWAY, replied
the Telelype. JERSEY LICENSE PLATF. . . . (and the salesman's
license number). and finally . OWNER OF RECORD NOT KNOWN .
John was typing this from the other Teletype in the barn.
The salesman stored at the Tclotypo. He looked around
at our cherubic smiling faces. He looked at the Teletype. "That's
all right,” said the salesman. "But now I'd like to show you a
real scour ily system. . ." And it was back to the old burglar
ala rm.
m
WRITER P iPDKeSMe/tf
The public is thoroughly confused about
computers, and the press and publicists are
scarcely free from blame. IT'S TIME FOR EX¬
PLANATIONS. People want to know what computer
syst'ems really do-- no more of this "latest
sptce-age technology" garbage. Mr. Business¬
man, Mr. Writer, are you man enough to start
telling it straight?
The computer priesthood, unfortunately,
often wants to awe people with, or unduly
stress, the notion of the computer being in¬
volved in a particular thing at all. It is
time for everybody to stop being impressed by
this and get on with things. Don't just copy-
edit what they give you. Nose around and
really find out, then write it loud and clear.
These Simple rules are ny suggestions for
bringing on more intelligent descriptions
that will help enlighten the public by osmosis.
1. FIND OUT AND DESCRIBE THE FUNDAMEN¬
TAL APPROACH AND PHILOSOPHY OF THE PROGRAM.
This can invariably be stated in three clear
English sentences or less, but not necessarily
by the peTson who created it. THIS IS WHAT
WRITERS ARE FOR: it is your duty to probe un¬
til the matter has become clear.
Examples .
4. Attempt to find out how else computers
are used in the particular area, and mention
these to help orient the reader.
This goes against the cxclusivist tenden¬
cies we all have when we want to ballyhoo
something. It is a matter of conscience, an
important one.
5. Questions to ask:
What are the premises of your pro¬
gram?
what if people turn out to need
something else?
What could go wrong?
And most important: What is that ?
IMPORTANT DISTINCTIONS
It is only by clarifying distinctions
that people are ever going to get anything
straight.
6 . Do not say "the computer" when you
mean "the system" or "the program,"
7. Don’t say "a malfunctioning computer”
(hardware error) if the computer functioned
as it was directed on an incorrect program
(software error). (And remember that the
best programmers make mistakes, so that a
catastrophic bug in a system is no sign that
it was programmed by an incompetent, only
that it isn't finished.)
deeply versed in computers or software, not
just a programmer. (Anyway, if something has
been programmed by an entomologist, it is
probably more interesting to refer to him as
an entomologist than as a "computer scientist.")
14. Do not refer to apparent intelligence
of the computer (unless that is an intended
feature of the program). Credit rather the in¬
genuity of the system’s creator. Do not say
"the clever computer." If anybody is clever
it is the programmer or program designer, and
if you think so, say so. These guys don't get
the recognition they deserve,
15. Never, never say "teach the computer"
as an elliptical way of saying "write computer
programs." Programming means creating exact
and specific plans that can be automatically
followed by the equipment. To say "teach" when
you mean "program" is like "persuading" a car
instead of driving it, or making a toilet "cry"
instead of flushing it,
(There are systems, described on the flip
side, which simulate intelligent processes and
may thus be said to "learn" or "be taught.”
But neither programming nor simulated learning
should be described in a slipshod fashion that
suggests the computer is some sort of trainable
baby, puppy or demon.)
16. Do not imply that something is "the
last word,” unless you have checked that it is.
BIBLIOGRAPHY
"This chess-playing program evaluates
possible moves in terms of various criteria
for partial success, and makes the move which
has the highest merit according to these
ratings."
"This music-composing program operates
on a semi-random basis, screening possible
notes for various kinds of attractiveness..."
"This archaeological cataloguing system
keeps track of a variety of objective features
of each artifact, plus information on where
it was, Including linkages indicating What
other artifacts were near it."
What or whose computer is used to do a
thing is of almost no concern (unless it is
one of unusual design, of which there are com¬
paratively few). Not the make of the compu¬
ter, but the GENERAL IDEA OF HOW THE PROCRAM
OPERATES, is the most important thing.
Of course, if you are being paid by a
hardware manufacturer, you'll have to name the
equipment over and over; but recognize that
y° ur 1* public understanding, and
put the facts across. (If you think It can't
be dona, read the splendid Kodak ada in the
Scientific American .)
l. Keep gee-whizzing restricted to the
description of a system's psychological effect
on real people. (What impresses you may turn
out to be old hat.) *—
3. Look for angles special to what you're
reporting. Pursuing details is likely to
bring up better story pegs and more human In¬
terest. Instead of saying "computer scientists"
have done something, you might find something
more Interesting for your lead; how about "The
unlikely team of a biophysicist and a teen-age
art student..." or-- finding what's special--
"Never before has this been done on a computer
so small, the size of a portable typewriter
(and having only some 4000 words of menory),,."
6 . (A particular point about graphics.
See flip side.) Don't say "TV screen" if a
computer screen is not TV, i.e,, S2S hori-
tontal lines that you can see on the screen
if you look for them. (See p.>*\i versus p.
HOW ABOUT: "visual display screen"
-- ydu can add, "on which the computer can
draw moving lines," or whatever else the
particular system does.
9. Don’t assume that your audionce is
computer-illiterate.
10. Don't assume that it can't all be
said simply. Only lazy or hard-pressetTwriters
are unclear.
11. Do not use cutesy-talk, particular
that which suggests that computers have an in¬
trinsic character. By "cutesy" I mean sen¬
tences like "Scientists have recently taught
a computer to play chess," Mis-Leads like
"What does a computer sound like?" (when talk¬
ing about music constructed by a particular
program in a particular way), and awe-struck
descriptions like, "At last the Space Age has
coma to the real estate business..."
12. Do not use the garbage term "compu¬
terized," unless there is a clear statement
of whore the computer is In the system, what
the computer is doing and how. A "computer¬
ized traffic system," for instance, could be
any damn thing, but a "system of traffic lights
under computer control, using various timing
techniques still under development," says
something.
13. Don't put in cliches as fact, for
example by the use &f such tena* aa "mathe¬
matical" or "computer scientist" unless they
really apply. Do not imply any mathematical
character unless you know the system possesses
it: many programs contain no operations that
can fairly be called mathematical. Similarly,
a "computer scientist" is someone widoly or
Ernest Gowers, Plain Words .
This wonderful little book showed
English civil Jervant* "bureaucratic
writing" was totally unnecessary. Its
precepts-- mainly concerned with calling
a spade a spade (see p. (1-)-- transpose
exactly to the computer world.
46
Ml HCARTS *Uj>WUDS
0 F People
Computer people are a mystery to others,
who see them as somewhat frightening, somewhat
ridiculous. Their concerns seea so peculiar,
their hours so bizarre, their language so in-
coaprehensible.
Computer people nay best be thought of
as a new ethnic group, very auch unto then-
selves. Now, it is very hard to characterize
ethnic groups in words, and certain to give
offense, but if I had to choose one word for
then it would be elfin . We are like those
little people down anong the nushrooas, skit¬
tering around completely preoccupied with
unfathomable concerns and seemingly indif¬
ferent to normal humanity. In the moonlight
(i.e., pretty late, with snacks around the
equipment) you may hear our music.
Practice saying then loudly and firmly to
yourself. That way you won't freeze
when they're pulled on you.
THAT’S NOT HOW YOU DO IT
THAT'S NOT HOW YOU USE COMPUTERS
THAT'S NOT WHAT YOU DO WITH COMPUTERS
THAT'S NOT HOW IT’S DONE
THAT'S NOT PRACTICAL
HOW MUCH DO YOU KNOW ABOUT COMPUTERS?
WITH YOUR BACKGROUND,
YOU COULDN'T UNDERSTAND IT
LET'S CALL IN SOMEONE WHO KNOWS THIS
APPLICATION (generally a shill)
IT ISN'T DONE
(you know the answer to that one)
and the one I've been waiting tb hear,
IF GOD HAD INTENDED COMPUTERS TO BE USED
THAT WAY, HE WOULD HAVE DESIGNED
THEM DIFFERENTLY.
Most importantly, the first rule in deal¬
ing with leprechauns applies ex hypotheai to
computer people: when one promisesto do you
a magical favor, keep your eyes fixed on him
until he has delivered" Or you will geT what
you Reserve. Programmers' promises are notor¬
iously unkept.
Unfortunately there is no room here to
coach you on how to reply to all these. Be
assured that there is always a reply. The
brute-force brazen comeback, equally dirty,
is just to say something like
DIDN'T YOU SEE THE LAST JOINT PROCEEDINGS?
But the dippy glories of this world, the
earnestness and whimsy, are something else.
A real computer fre»k, if you ask him for a
program to print calendars, will write a pro¬
gram that gives you your choice of Gregorian,
Julian, Old Russian and French Revolutionary,
in either small reference printouts or big
ones you can write in.
OH YEAH7 WHAT ABOUT THE x WORK
USING A y?
(where x is anyplace on the map on p. fT
and y is any current computer, such as a
PDP-10 .)
Computer people have many ordinary traits
that show up in extraordinary ways-- loyalty,
pride, temper, vengefulness and so on. They
have particular qualities, as well, of dogged¬
ness and constrained fantasy that enable them
to produce in their work. (Once at lunch 1
asked a tablefull of programmers what plane
figures they could get out of one cut through
a cube. 1 got about three times as many ans¬
wers .as I thought there were.)
Unfortunately there is no room or time
to go on about all these things-- see Biblio¬
graphy-- but in this particular area of fan¬
tasy and emotion I have observed some interes¬
ting things.
One common trait of our times-- the tech¬
nique of obscuring oneself-- may be more com¬
mon among computer people than others (see
"The Myth of the Machine," p. ? , and also
"Cybercrud,” p. $ ). Perhaps a certain dis-
gruntlement with the world of people fuses
with fascination for (and envy of?) machines.
Anyway, m»ny of us who have gotten along badly
with people find here a realm of abstractions
to invent and choreograph, privately and with
continuing control. A strange house for the
emotions, this. Like Hegel, who became most
eloquent and ardent when he was lecturing at
his most theoretical, it is interesting to be
among computer freaks boisterously explaining
the cross-tangled ramifications of some system
they have seen or would like to build.
(A syndrome to ponder. I have seen it
more than once: the Technical person who, with
someone he cares about, cannot stop talking
about his ideas for a project. A poignant
type of Freudian displacement.)
A sad aspect of this, incidentally, is by
no means obvious. This is that the same com¬
puter folks who chatter eloquently about sys¬
tems that fascinate them tend to fall dark and
silent while someone else is expounding his own
fascinations. You would expect that the person
with effulgent technical enthusiasms would
really click with kindred spirits. In my ex¬
perience this only happens briefly: hostili¬
ties and disagreements boil out of nowhere to
cut the good mood. My only conclusion is that
the same spirit that originally drives us mut¬
tering into the clockwork feels threatened
when others start monkeying with what has been
controlled and private fantasy.
This can be summed up as follows: NOBODY
WANTS TO HEAR ABOUT ANOTHER GUY'S SYSTEM.
Here as elsewhere, things fuse to block human
communication: envy, dislike of being domina¬
ted, refusal to relate emotionally, and what¬
ever else. Whatever computer people hear
about, it seems they immediately try to top.
Which is not to say that computer people
are mere clockwork lemons or Bettelheimian
robot-children. But the tendencies are there.
BIBLIOGRAPHY
D
\
\
i
... programmers. in my experience.
tend to be painstaking, logical,
inhibited, cautious, restrained,
defensive, methodical, and ritualistic."
Ken Knowlton.
"Collaborations with Artists--
A Programmer’s Reflections."
in Nake a Rosenfeld (eds.).
Graphic Languages
(North-Holiand Pub. Co.), p. 399.
USEFUL. AND POSSIBLY EMBARRASSING QUESTIONS
If the Computer Priests start to pick on you,
here are some helpful phrases that will give you
strength.
I do not want to give the impression that the
Guardians of the Machine are always bad guys.
Nevertheless, sad to relate, they are not always
good guys. Like everyone out to bolster his position,
including the plumber and the electrician, the computer-
man has learned how easy it is to intimidate the layman.
Now, these people are often right. But if
you have reason to question the way things are done--
whether you're a member of the same corporation,
a consumer advocate or whatever-- you are probably
entitled to straight answers that will help settle the
matter honestly, without putdowns. Any honest
Now, these helpful questions, honestly answered,
may elicit long mysterious answers. Be patient
and confident . Write down what's said and sit down
with the glossary in this book until you understand
the answer. Then you can ask more questions.
1 am not inviting the reader to make trouble
flippantly. I am suggesting that many people have
a right to know which ha* not been exercised, and
there may be some discomfort at first.
HOW DOES IT WORK?
(This question may have to be backed
up as follows: "There are no computer systems
whose workings cannot be clearly described
to someone who understands the basics. I
INSIST THAT YOU MAKE A SINCERE ATTEMPT.')
WHY DO YOU CLAIM IT HAS TO BE THIS WAY?
(SPEAK MORE SLOWLY , PLEASE.)
WHAT IS THE DATA STRUCTURE?
COULD YOU EXPLAIN THAT IN TERMS OF THE DATA
STRUCTURE?
WHO DESIGNED THIS DATA STRUCTURE?
Gerald M. Weinberg, The Psychology of Computer
Programming . VazTNSTtranj RiiHKoTH. 1
veil
Sysi
itic treatment in a related
This case is so classic it's almost a Punch
and Judy show.
And can 1 talk to him?
WHAT IS THE ALGORITHM?
WHO IS THE PROGRAMMER?
And can 1 talk to him?
WHY DO WE HAVE TO USE A CANNED PROGRAM FOR
THIS?
WHY IS THE INPUT LANGUAGE SO COMPLICATED?
WHY DO WE NEED CARDS? WHY CAN’T PEOPLE TYPE
IN THEIR OWN INPUT?
WHY NOT HAVE A SIMPLE-MINDED FRONT END THAT
LETS USERS CONTROL IT THEMSELVES?
WHY HAVE FORMS TO FILL OUT? WHY NOT HAVE
A DIALOGUE FRONT-END ON A MINI?
WHY CAN'T IT BE ON-LINE? OCTI*** A aft (if aa. 7
WHY DOES IT HAVE TO BE THAT BRAND OF COMPUTER?
WHY NOT GET A SYSTEM WITH LESS OVERHEAD?
WHY SHOULD ALL COMPUTER OPERATIONS BE CENTRALIZED?
DON'T THEY GET IN EACH OTHER’S WAY?
WHY DOES IT ALL HAVE TO BE ON ONE COMPUTER?
WHY NOT PUT PART OF IT ON A DEDICATED MINI?
WHY CAN’T WE DO THIS PARTICULAR THING ALL
ON A MINI?
WOULDN'T IT COST LESS IF WE GOT A MINICOMPUTER
FOR THIS TASK?
WHY CAN’T THIS BE PROGRAMMED IN SOME LANCUACE
LIKE BASIC?
YOU KNOW AND I KNOW THAT COMPUTERS DON*T
HAVE TO WORK THAT WAY . WHY DO YOU CHOOSE
TO DO IT THAT WAY?
If these suggestions seem unnecessarily contentious,
it is because some of these guys like to pick on people,
and you may have to be ready. And you may need
all the support you can get, if. say, you take a stand
like one of three:
"If the informaUon is In there, I don't see why
we can’t get it out. "
"You have no right to ask questions like this,
and If the program requires it, change the program."
Remember , 1LLEOITIMIS NON CARBORUNDUM
(don't let the baetarda grind you down)
"For ns it always cow* do.
challenge: not Juat to errata a
the specifications, but to do it
find aesthetically pleasing."
« personal
as that aeet i
way that I
Robert H. Jones IV.
a heevy programmer at Chrysler
hfe50HT»oM
K Very important kind of discussion takes
place between people who want computer programs,
but can’t write them, end people who can write
them, but don't want to. Or, that la, who don’t
want to get caught having to do a lot of unneces¬
sary work if it could be done more simply.
the progr
cam negotiation , then, i* where
*— he may actually be the boss-
program that will do so-and-so,
aeseer says, "I'd rather do it tb
says,
’and
» way."
In a series of requests and counter-offers
the customer explains what he wants and the pro¬
grammer explains why he would rather do it a dif¬
ferent way. £t U essential for both sides to
■»*» themselves completely clear . Often the~us-
* Gft er thinks he wants one thing but would be
quite satisfied with another that is much easier
to program, often the programmer can make help-
ful auggeatione of better way* to do it that will
be easier for him.
Very bad things can happen if program nego¬
tiation it not done carefully and honestly enough.
The programer can misunderstand and create sou¬
thing that was not wanted, or the customer can
carelessly misstate himself and ask for the wrong
thing. Or worst of all— the prograamwr can de¬
liberately mishear end do something different,
saying, "There, that’s what you wanted," as he
hand* over something that isn't what was really
asked for. And the poor customer may even believe
it (see "Cybercrud," p. 1 ).
Program negotiation should be more widely
acknowledged as a difficult and painful businats.
It is exhausting and fraught with stress: people
(on both sides) get all kinds of psychosematic
symptom* (like abdominal pains, tics and chill*).
The fact that people's careers often depend on
the outcome makes the atmosphere worse, rather
than fostering the thorough and sympathet .1 c coop¬
eration which is essential.
If there is one thing that laymen in business
should be taught about computing, this is it.
THE HEFTING OP THE MINOS
The Customer,
Naive Advocate
I don’t see why
since it's e computer...
These are not detaile
that concern me..,
Theee are just
technical issues...
1 swan a computer
can do all these things.
The "Expert”
-C
What you’ve gotta
understand Is that there
ere problems involved...
way■..
Leave it to me, it’ll
be juat what you want...
Coawuppancei the customer will get what he deserve*.
Moral : if you want sowthing. you’d better damn wall
negotiate it at the detailed level.
The strange languaga of computer people makes
more sense than laymen noceaserily realise.
It’s a generalized analytical way of looking
at time . space and activity . Consider the
following.
"THERE IS INSIGNIFICANT BUFFER SPACE IN
THE FRONT HALL." (Buffer: place to put
something temporarily.)
"BEFORE I ACKNOWLEDGE YOUR INTERRUPT. LET
ME TAKE THIS PROCESS TO TERMINATION "
"COOKING IS AN ART OF INTERLEAVING
TIME-BOUND OPERATIONS." (I.e.. doing
parts of separate job* in tha right order
with an aye on tha clock.)
hyiw» fw ;
In the early throes of computer enthusiasm,
it is e*sy to suppose that any thing can be done
by computer-- thet is, anything involving the
chewing or diddling of information. This is
decidedly not so.
For instance, It is easy enough, and often
practical, to have a computer do something a few
million tines. But it is almost never practical
to have a computer do something a trillion times.
Why? Well, let’s say (for the sake ot simnli-
city) that a certain program loop takes 1/1000
of a second. To do it a thousand times, then,
would take one second, and to do it a million
tines would take a thousand seconds, or about
seventeen minutes. But to do it a trillion times,
now, would mean doing it 17,000,000 a
over thirty years.
unutes ,
Now, you will note that even if you speed up
that loop to 1/1,000,000 of a second, a trillion
repetitions will take almost twelve days, which
is obviously going to need sone justifying, even
assuming that it is otherwise feasible.
(For problems of this type people begin
thinking about building special hardware, any¬
way It will be noted, for instance, that the
PDP-I6-- see p. - - lets you compile your own
special equipment for prohlems that need eter¬
nal repetitious.
COMBINATORIAL EXPLOSIONS
One kind of thing that's too much to do
is generally called a combinatorial explosion --
that is, a problem that "explodes"
many things to do. For instance, <
game of chess. Just because you <
isider the
program to look ahead at all the possible out¬
comes of, say, tic-tac-toe, that doesn't mean
you can consider all the possibilities of chess,
To look at ’’all" the possibilities just a few
moves ahead involves you in trillions of
calculations. Reuembcr about trillions? And
it turns out that there are a lot of problems
like that.
METHODS FOR DOING THINGS
1
Th# problem la alwaya to think up
methods for doing thing* by computer .
(Mao called algorithm* .)
Basically what can be don* by
ccaqnitar I* what can be dona on a
tab la top with slip* of paper— temper -
Ing, copying, aortlng, marking, doing
arlthmatlc— and handing slips of paper
out to uaar*.
So the question should never be,
-HOW would you do that by computer?"
— but "Can you think of a method
for acctsaplishlng that?” The "co^nitei
is really Irrelevant, for it has no
nature and merety twiddles Information
L_”
.Then there is the problem of "Turing im¬
possibility." Turing was a nathenatician who
discovered that some things can be done se¬
quentially in a finite amount of tine, and
some things can't , such as proving certain
types of mathematical theorem. In other words,
anything that has to do things in sequence--
whether a computer or a nind of God, if any--
cannot possibly know anything which is not
Turing-computable. Another important linita-
t ion.
On a more practical level, though, there
are just lots of things which nobody has figur¬
ed out how to do in any feasible way, or arc
just now figuring out different systematic ways
of doing. (For 3 favorite such area of mine,
compare the different conputer half-tone image
synthesis systems described on pp. DM lito
DM "5*| .)
Thus you see that figgering out ways of
doing stuff is still one of the principal as¬
pects of' the computer field. {Whole journals
are devoted to it, such as CACM, JACM and so on.)
But then of course, every few years there
comes a new movement in the field that bodes to
make us start all over.
One such trend is called structured prog¬
ramming , being promulgated by a Dutch research-
er named Dijkstra, among others. The idea of
structured programming is to restrict computing
languages in certain ways and "eliminate the
CO TO," i.e., no longer have jumps to labeled
places in programs. By dividing computer prog¬
rams up only in certain ways, goes this school
of thought, the programs can perhaps be proven
workable, in the mathematical sense, rather
than just demonstrated to work , as they are now--
a notoriously error-prone situation. If the
Dijkstra school is correct, we may have to
Start all over again with a new bunch of prog¬
ramming languages.
These remarks give you the flavor of some
restrictions and lines of development. The rest
of this page is devoted to The Great Software
Problem-- the Operating System.
OWVfcr
tfSTOfr'SfeO
• or OS/360, or OS
He have no space here to discuss OS,
the operating system of the IBM 360 and 370,
which it just as well: it is a notoriously
heavy-handed system, elaborated with what
some would call devastating nesslnoss. Kinds
of convenience taken for granted by users of
such computer systems as the Burroughs 3000,
the POP-10, DTSS snd others aren’t there.
The programmer has to concern himself
with intricacies having names like ACONs,
VCONs, TCBs, ECBs, and the complications of
JCL. (While these other systems may have
equivalent complications, the programmer
need not mess with them to create efficient
programs, as the 360 demands.) The pro¬
grammer must even set nldc the previous
programmer's information in "SAVE AREAS,"
which is like a restaurant guest having to
clear the dirty dishes on sitting down —
and return then when he leaves. Several of
the 360't sixteen general registers are con¬
fiscated. Time-sharing requires its own
JCL-type language. And so on.
IBM says its forthcoming operating sys¬
tem, OS/VS2-2, will be better.
BIBLIOGRAPHY
A.L. Scherr, "The Design of IBM 0S/VS2 Re¬
lease 2." Proc. MCC 73, 317-394.
Basically, an operating system is a
program that supervises all the other pro¬
grams in a computer. For this reason it is
also called a supervisor or a monitor .
Because the operating system is supposed to
be in charge, many computers now offer spe¬
cial wired-in instructions that only the
operating system can use. This prevents
other programs from taking complete control
of the machine.
Operating systems cone in all sites.
The bigger ones take up a lot of computer
time because they have to do a tot. The
smallest kind, which are really kind of
different, are just to help a single pro¬
grammer move quickly between his basic
programs. {A typical such system Is PEC’s
DOS, or Disk Operating System, which you
can get with the PDP-11.) This system is
really a kind of butler that keeps track of
where your basic programs are stored on disk
and brings then in for you quickly.
A step up is the Batch Monitor, or op¬
erating system set up for Batch Processing
(see p.&~2X). In batch processing, pro¬
grams go through the computer as if on «
conveyer belt, one at a time (or in some
systems several at a tine). The operating
system shepherds then.
We’re waiting.
batch processing is used when programs
don't need any interaction with human users.
(Or, and this is more common, when human
users want time-sharing but can 1 t get it;
sec below.) A oultiprograimning operating
system is one that allows several different
programs (or conveyor-belt sequences of
batch programs) to operate at one tine.
(This is how most IBM 360s are used.)
BIBLIOGRAPHY
M.V. Wilkes, Tine - Sharing Computer Systems .
MacDonald/American Elsevier Publishing Co.
All About Timesharing Service Companies ■
Oatapro Research (I Corporate Center,
Moorestown, NJ 08057), $10.
equipment snd working rules and schedules
and software. And change the parts through
which mischievous users crash the system.
Systems people often look like dirty
rats to users of computer systems. To
each ocher they often look like harried,
overworked, unsung heroes, their fingers
(snd whatever else) In the dike, crying
to hold back the tide of Disorder.
Then there is time-sharing.
Tine-sharing means the simultaneous use
if one computer by several different users
it once. It's basically a complex form of
lultiprogramming.
It was created by Keneny and Kurt:,
who created the BASIC language to be used
on it (see p. !{, ).
Their computer arrived in fall '63.
Their time-sharing systen went into opera¬
tion in spring '64, programmed mostly by
Dartmouth students , and has grown and im¬
proved continuously since then. On that
basis: programmed by students.
The Dartmouth computer philosophy--
i.e., the idea carried through by John
Kemeny and Tom Kurtz--was that a conputer
is like a library: its services should be
>ugh some general fund.
Students and faculty at Dartmouth
it free. (Unless they have grants.)
can use it too, if you pay.
In principle this is like a la:y susan.
The central computer works on one user’s pro¬
gram for a while, then on another's... until
it is back to the first user.
There are basically two kinds of time¬
sharing: time-sharing where you can only use
certain facilities or languages, and time¬
sharing where you can use all the facilities
of the computer (including programming in the
computer's assembly language).
The result: everybody at Dartmouth
uses the computer. It's always running,
(ahem) six days a week. There are almost
two hundred terminals around the campus;
peak afternoon usage is about a hundred
and fifty. Freshmen learn BASIC first
thing, after which the conputer is a
standing facility, to be used in courses
in music, sociology, literature, history,
engineering or whatever; for independent
research; or just for fun and games and
showing off to visitors.
Examples of restricted time-sharing are
the various minicomputer systems that arc
available which time-share the BASIC language.
{Nova and PDP-11 and Hewlett-Packard, for
instance.)
Some examples of unrestricted time¬
sharing are the PDP-10 (see p. Ho), Dart¬
mouth's DTSS, Honeywell's MULT1CS, IBM's TSO,
and General Electric's MARK III.
Bigger is not necessarily better. For
instance, there are time-shared versions of
BASIC that run on big IBM computers. How¬
ever, it may very well be that big IBM in¬
stallations can save money by eliminating
this function and buying instead a small
Hewlett-Packard minicomputer to run their
BASIC on, thereby supplying BASIC to more
users at less cost and freeing the 360 for
whatever it is IBM systems do better.
The entire Dartmouth system is built
for simplicity and clarity, with explana¬
tions of all the facilities available at
terminals. (The command expi ain JCK caus¬
es the terminal to type out a picture of
Kemeny.)
Many fuddy-duddies insist that computer
usage should be billed , as it is on most
college campuses': TTTat is essentially the
Calvinist view. But what if we treated li¬
braries like that? It would probably cost
S10 jus t to borrow any book . The point is
that lT"we - bcTTeve tKat certain conditions
are a social good, then we should be flex¬
ible about how to implement them. (5ee Arthur
W. Luehrmann and John M. Nevison, "Computer
Use under a Frec-Access Policy, Science , 31
May 74, 957-961. This articl" -
line of argument and further
Dartmouth billing system.)
:ribcs the
Restricted time-sharing, with only one
or a few languages offered, is much easier to
provide for than full time-sharing.
Full time-sharing is always shared with
batch. In other words, the computer, darting
among users, still finds some time to devote
to the batch stream.
Time-sharing is self-limiting. That is,
the more users are signed onto a tine-sharing
system at a given moment, the more slowly the
system responds to all of them.
Operating systems are big and hard to
program . They take a lot oTthe computer 7 *
time: for instance, Dartmouth's time-sharing
operating system, taking as much as 231 of
the computer's time, is considered efficient.
The importance of time-sharing is not in
terms of "raw" efficiency, that is, the cost
of each million operations, but in term* of
human efficiency, the ability of each user to
got so much more out of the computer by using
Interactive programs and languages.
OPERATING SYSTEMS TRICKERY
Anyway, Dartmouth will sell you its tim«
sharing system for about J7500 a month (and
you’ll need a computer setup that begins at
$17,500 a month). That’ll run 50 terminals.
A bigger setup will cost more. But that get!
you Fortran, COBOL, SN0B0L, etc.. ttc best
BASIC in the whole world, games, financial
systems, and myriad other programs they've
built at Dartmouth, Furthermore, Mr. Adminia
trator, it means the system will be available
to users with a minimum of complication and
bother.
A number of companies have bought. In¬
cluding the U.S. Naval Academy at Annapolis,
which offers Dartnouth-style computing to
its midshipmen.
Connect charge is $2 to $9 an hour
depending on your terminal
speed, plus processing charges.
Contact: DTSS, INC., Hanover Nil
037SS. (Several commercial
firms also offer DTSS to users,
including Computer Sharing Ser¬
vices, Inc. Denver; Crumman Data
WHERE TO GET IT
No way can we here get into the prose and
cons (both senses) of the myriad time-sharing
services that are available. An excellent
summary of fifty-six different time-sharing
services (variously using computers by Honey¬
well, IBM, DEC, Univac, CDC, Xerox and
Burroughs) appeared in the February, 1973
Computer Decisions ("Piecing Out the Timeshar¬
ing Puttie" by John R. Hillegass, pp. 24-32).
This summarises information available from
Oatapro Research Corp. , Moorestown, NJ. The
article cautions against the potential high
cost of tine-sharing services, and urges you
to get all the advice you can before commit¬
ting to a time-sharing service.
-4
IWCS!
MULT ICS was announced in 1965 as the
Time-Sharing System of All Time, to be
created jointly by MIT, General Electric
and Hell Labs.
It took a lot longer to get going
than they expected-- I have a 1968 (?)
button that says, YOU NEVER OUTGROW YOUR
Sinn FOR MULTICS-- but now it's available
from Honeywell. Tcople say it’s the
greatest, all right-- its fascinating
facilities include the ability to execute
parts of other people's programs, if you
have permission-- but it's also rtid to be
awfully expensive.
Interestingly, the MULTICS operating
systen is largely programmed in the PL/I
language (see p. ) .
Contact: Honeywell Information
5ysterns, 200 Smith Street,
MS 061, Waltham, Mass. 021S4.
VK UoRV$:
Grt'i
MM
Sone tine-sharing systems are local, others
have "concentrators” allowing users in other
cities to log into them with local telephone
calls.
Perhaps the nost far-reaching time-sharing
system, though, is General Electric's MARK III,
with concentrators in many of the major cities
of the world (mostly Europe). The main com¬
puter is in Ohio, but the overall system may be
thought of as an octopus around the globe. Be¬
sides hundreds of cities in the USA, The GE
systen offers local access in Australia, Austria,
Belgium Canada. Denmark, Finland, France,
Italy. Japan, Netherlands. Norway, Puerto Rico.
Sweden, Swil:erlaml, United Kingdom and West
What this basically means IS that if a
pany has offices in these places, it can
its internal communication through General
ctric’s computer syst<
i presents obvious
,ts and Jifficul-
, lvv . ,j discuss here,
be expensive.
They also offer a toll-free
General Electric Informa¬
tion Service*
Business Division,
401 North Washington Jt ,
Rockville, Md. 20850.
T $0
it i
graaaing.
terminal
a sort of interactive batch pro-
That is. it allows the user at a
j communicate with program* running
in batch mode.
Swapping means transferring one user's
program out of core memory in order to move
in somebody else’* program. This can happen
very rapidly, and even when it's done to you
every turn, your terminal may seem to respond
as though you are in continuous possession of
the entire computer
The most enjoyable
Computer Conference was
Dartmouth System, DTSS.
•«.*lorn at ih* 1974 National
the Nostalgia session on the
Ih* Old Hands were there¬
on the original time-sharing
come grownups of on* sort or
Paging is one of the Great Abstruse
Problems ot modern operating systems. The
problem is this: you’ve always got fast ex¬
pensive memory and cheap slow memory. How
can the operating system store most of your
program in cheap slow memory and still predict
which parts you'll need soon enough to get
than In there for you? In the hotter systems,
indeed, the operating system tries to predict
what's most important and move it to a fast
little memory celled a cache . This are# it
so bitarr* and complicated 1 prefer not to
think about it. "Minis for me," says Mr.
Natural.
by J.r
man between
manufacturer
■ B. Wiener,
1* company to atop the Dartmouth "experl-
y he could, or loaa hi* job 1" ' hr «*
did no such thin*, snd (ha eaid) alter
continued to help the Dartmouth effort,
holding weekend meetings with other* fro-
w*-do-our-real-job medal.
> the Frances 0. Xalaay
la this IS * lorn ur t ' T
its detractors tend to compare it with
f call "true" time-sharing, such as
the PDP-10), it has a number of draw-
instance. on the modal 158. * f»»r-
machina (ca. JS0,000 a month-- see
fio normally allows only twint*
Jill*
IBM is urging its fan*
text operating system,
be much better.
to believe that
called OS/V52-2,
HtRf THEY COM-He
0>*Tvr&es i Mi ip c co^py^Jt;
■B 19 flea. have little flee, that bite 'eeu
And no forth, «d Infinitum ."
Microprocessors are what’s happening
Computers cost several thousand bucks on up.
Microprocessors cost several hundred on up, and
that price range Is falling fast.
Soiae ■icroprocessors are already on integra ¬
ted circuits . postage stamp-sized electronic
tangles that are simply printed and baked, rather
than wired up; this means there is effectively
no bottom limit to the price of microprocessors.
Sark this well. It means that in a few years
there will be a microprocessor in your refriger¬
ator, your typewriter, your lawnmower, your car,
and possibly your wallet. (If you don’t believe
this, look what happened to pocket calculators in
the last couple of years. The chip those are
built around costs five bucks. But next come the
programmable chips, the microprocessors.)
Microprocessors should not be called micro ¬
computers , a term that seems to have captivated
Kail Street lately. "Microcomputer" just means
any teeny computer; but there is an exact and
crucial difference between an ordinary computer
(whatever its size) and a micToprocesaor (what-
A microprocessor is a two-level computer .
You will remember from the "Rock Bottom”
section (pp. 32-3) that every computer has an
internal language of binary patterns or "machine
language" (illustrated in horrendous detail in
the program called "Bucky’s Kristwatch," pp.33-4).
This means, for instance, that machines can
be created which may be programmed directly in some
higher-level language, such as APL (note Canadian
machine described on p. Z-l) or BASIC (note one of
the Hewlett-Packard machines described on p. 17 ).
T^ ar * Cl * rS in the u PP er “ level program (APL or
BASIC), stepped through by the upper-level program
follower, cause the lower-level program follower to
carry out the operations of the language.
Second, the machine costs less to make than an
ordinary computer. The reason is that the archi¬
tecture of ordinary computers is designed now (at
J*? 1 ) 5° r ..PI°yy* J1, f r convenience . Thus a machine
like the PDP-11, which in principle does nothing
any other computer doesn’t do, is still more desir¬
able than most, because its instructions arc so
well designed. It is clear and sensible to the pro¬
grammer, with the result that programming it takes
less tisie and costs less money.
Microprocessors reverse this trend. The lower-
level structure of registers and instructions can be
anything that is convenient to manufacture, whether
or not programmers like it. Low manufacturing cost
is one of the mam design criteria.
The purpose of microprocessors, you see, is
generally to be hidden in other equipment and do
some simple thing over and over; not to have their
programs changed around all the tine as on an ordi¬
nary computer.
?*? re exceptions, computers which have a
second level down where you can put microprograms;
and these are called, sensibly enough, aicroprogran-
■me computers . They are bought and s et up wi t h
regular computer accessories, plus facilities to
change the microprograms. Thus they cost a lot more;
but oh, they do so much more for you. You can design
your own computer-- i.e., its instruction-set-- and
then create it, with a microprogram. (See the Stan¬
dard Computer and the Meta-4, n?arby.)
another binary language
tbal’e cheaper to wire up.
UAWiWAee.-
equipment itself.
Softuhik.-
computer programs
FMmitc:
underprogrsms for
microprocessors (Also
callad Microprograms.
Should be called Undarware.)
The trick that makes this all work-- whether
for the hidden-away type or the computer type of
microprocessor-- is that the lower level has a much
faster memory than the upper level. This neans
that an upper-level word can be taken, and looked
up in the lower level, and all the lower-level steps
carried out, very fast compared to the upper-level
memory. Many such“nac>i ines, for instance, have
lower-level speods in the nanoseconds (billionths
of a second), while the upper-level speeds are mere¬
ly in the microseconds (millionths of a second).
A last point. One of the most important char¬
acteristics of an ordinary computer is its word
length, that is, the number of binary positions in
a usual chunk of its information.
rrmie ijrr ..i
DM fit Mi; ,« , vj
CeMM. twsu*^ (to i.tj, ,t* f vi_)
But Jince microprocessors have two separate levels,
they often have two separate word lengths as well;
the upper-level and the lower-level.
between--
ROM-- Read-Only ,Memory. Contents can’t be
changed, costs less than changeable (at
any given speed).
RAM-- Rapid-Access Memory. Also called
read-write memory. Same as core memory:
May have its contents changed. NOT!; if
you simulate some computer with a micro¬
program, its simulated "registers" are
usually locations in the lower-level RAM.
RMM-- Read-Mostly Memory. You can get out its
contents fast, but change them onlv very
slowly.
(The lower-level memory is sometimes called
"program memory" and the upper-level memory is often
called "data memory, but this is a confusion result¬
ing from certain typical applications of the devices,
rather than their inherent nature. You can have
programs at both levels.)
BIBLIOGRAPHY
Raymond M. ilolt and Manuel R. i.emas, "Current
Microcomputer Architecture.” Computer
Design , Feb 74, 65-73. --
Summarizes nine teeny machines now
on the market (some 1-level). Good bib¬
liography also.
Standard Conputci
Burroughs 1700
36 bits
16 bits
900 nsec
24 bits
ilig 6 expensive.
Op to 32 hard¬
ware registers.
Comes with cassette
holding various
emulators,
3650 stripped.
Aire. Jr?——
gramned t
r IIP computei
Microdata 3200
64 bits
165 nsec
(190 read-s
as well. $7500.
$8000 up ($10,000
for model 32/S,
stack-oriented).
$15,000 to $100,000
(heavy upgrade of
Varian 620).
^i ceopfectirwer t*> *e »»fro
Intel Mcs-e
Intel MCS-4
SYS 500
> 24 bit!
10 nsec
r 16 bit!
Ml C 1
> 800
} 1600
(Keird but lnt
among many s
16 bits
220 nse
200 nse
AES-80 (Auto. Electric
Systems, Montreal)
National Semiconductor
IMP-16C (8 1/2 x 11-- odd si
DEC PDP-16M 8 bits
240 nsec 240
for computi
Stack-oriented (nc
fas ter model).
Basic chip $60.
$1380 stripped
, convenient for notebook.)
$2000. I Compatible
Atron 601
16 bit
^(Abbreviations: nsac (nanoseconds,
usee (microseconds, millionth:,
abbreviation).)
The history hooks ten years
will note that the first computer-on-a-chln ._
to placement in others’ machines at low cost Thl.
means that if you make a fancy bulldozer or bake-
ore Ai !!!!*.'(“hV 1 • t0 have 50 " ,c r ° rn of intricate
pre-planned hehavior, you’ll p ut "the Intel chip"
chins AC whic’ l , )r sJ»% 1, ? tel Cl ‘ ,p ” * nu ' nb * r of separate
chips, vhic.t start low in cost-- a fairly coupletc
lnJo C ! n f b ?i h#J f0T unJer JS0 °" ani1 can i> e assembled
fee eomni’J con P uter - (Indeed, various firms do of-
cludin7ine%h OS>PU Ullt ° Ut ° f Intcl thirTT 1"
25 B yeSrs!? ° f ° re ° C °° kie * *«T«t..d
MCS,
HCS-4
MCS-8
^The original Intel chips are the MCS-4
Upper level
Lower level
4 bit
>. 16 bits
(900 nanoseconds)
(10.8
microseconds)
9 bits 8 to 24 bits
112 ’? , WO nanoseconds)
microseconds)
While these individual chins cost under a hundred
dollars each, memories and other necessary sections
cost extra. For people who want to develop systems
around these chips, Intel has cannily prepared a nua-
ber of setups. If you want to go 4-bit, you get the
Intellec 4, $2200, which also needs a Teletype,
This give* yo u various display lights and debugging
features. Meanwhile, you can assemble and simulate
on simulation programs offered on national tirae-shar-
want t0 8° 8 ‘ bU - Y 011 the "Intellec
8 for $2400 (also without Teletype), and benefit ad¬
ditionally from the fact that you can prepare the
underware in PL/1 , and compile it on national time-
sharing.
Crafty and clever Intel, which has captured nuch
of the overall market .ilrcady, has now brought out
nuch faster versions of these chips. RaJi.
•tie
A computer wittily called the Meta 4 (hen heh)
is a fairly neat machine made by Digital Scientific
Corp. , 11455 Sorrento Valley Rd., San Diego CA 92121.
lower memory: 16 bits, 90 nanoseconds (or 35
nanoseconds, programmed by a card (on
which you darken the squares .)
Upper memory: 16 bits, 900 nanoseconds.
What this is is a very high-power minicomputer:
it can be turned into a lookalike for any other 16-bit
minicomputer. For instance, they can sell it to you
with an imitative microprogram that turns it effec¬
tively into an IBM 1130. From a marketing point of
view, this effectively means a firm owning an IBM 1130
can replace it with a Meta 4 which runs the same pro¬
grams, saves money and gives you in addition the bot-
ton-level features of a far more powerful computer.
(Such an under-level program that makes one machine
effectively imitate another computer is called an
emulator.) This capacity to emulate other computers
is the "metaphor” alluded to in the machine's name.
sue,
The Lockheed SUE ("System User-Engineered
Computer") Is a very Interesting and desirable
machine. The central processing unit costs s little
over six hundred and forty dollars! (That's without
memory, power supply or card cage. ) It uses s
Grand Dus system of interconnection (see p. HZ )-
It’s s microprocessor. The lower-level cycle
time is 50 nanoseconds , so it can be programmed to
imitate any microsecond mini.
One nice thing is that you can put together
several epu'a and different memories-- core,
semiconductor and ROM- - selecting with switches
which epus have what priorities in what memories,
as well as Interrupts, stc. Dim nice-- especially
considering tha upper-level instruction-eel.
Ths microprogram it cornea with makes tha
Lockheed SUE into a sort or copy (77) of the PDP-11,
including its sight registers and similar address
modes (see p.'il.) ■
Was the name SUE actually Lockheed’s
Impudent challenge to DEC7 DEC did sue, but no
outcome has been publicised.
w Sifityntp
A microprogrammablc higgle has been available
for some tine. It’s a 36-blt conputor nanufacturad
by Standard Conputor Corporation, 1411 K. Oiynpic
Boulevard, Los Angelas, CA 90015.
This conputer is a serious machine, in the
nany-hundrad-thousand-dollar class, which can be
set up to ninic any other 36-blt nachine. It has
been sold in two versions: one a pure FORTRAN na¬
chine (that’s right, its upper language,, is pure
Fortran!) and a lookalike for the
level word length is 18 bits.
IBM 7094.
(An interesting puzzle is why this outfit has
not gotten together with Lincoln laboratories. Lin¬
coln Laboratories, outside Boston, has a 36-bit ex-
perlnental machine celled the TX-2 which has been
used for computer graphics, such as Sutherland s
SKETCHPAD syston (see p. and Sucker I CENE-
SYS (see p. 29 )■ Now, presumably Lincoln Lab*,
like most other research outfits, is hurting for
money. Why couldn’t thev make an arrangement for
Standard to sell its machine with a TX-. emulator,
thus making.available such programs as Sketchpad ^
(which has never been equalled) to a wider public.
'13
4* /fa
There are a lot of stranje coaputan being
dealgned— it’s a traditional occupation of
electronics professors and a great war to soak
the Defense Department— but this one la coa-
nerctally available. Mow if we just knew what
to do with it.
Goodyear's STARAH is the first available
computer with a Content-Addressable Memory,
which is actually very hot stuff. Instead of
having to search for a particular item of infor¬
mation in core, or having to make lists of where
in core things are being put, or creating linked
data structures (soe p. 2&> ) > the program can
simply ask all items of data having particular
properties to step forward.
It works like this. Having an immense 256-
bit word to play with, the programmer uses dif¬
ferent parts or "fields* of the word (see p. t*, ^-2'
to specify what other information ia in iti *
F-of
1**1
lie*-}
M<J
With a single command, the program may ask
all words in memory to clesr s particular field,
or set a particular bit. Then with another com¬
mand it can tell all memory locations with par¬
ticular identifiers to add a certain number to
their data, and this occurs in a couple of micro¬
seconds. Or it can direct all memory locations
having particular identifiers to multiply one
section of their data by another-- which takes
rather longer.
Thia is an entirely different kind of pro¬
gramming, and considering how much thought com¬
puter people have given to doing things one at a
time, it kind of sets you back a little. Tbs
brochure lists these possible spplicationat
'ballistic missile defense," "intelligence dsta
processing," "electronic warfare," "airborne
command and control," as well as more peaceful
applications like weather prediction, data man-
"Comoot, transportation reservations, air traffic
control. Truth is, moat computer people would
have to scratch their - heads quite s while to fig¬
ure out how to start using this fascinating ma¬
chine for any of theae things; the reason the
military applicationa seem to be so many la sim¬
ply that the military computer types have boen
scratching their heads longer. We might as
well start too, and find some of the nicer things
to do for humanity with it.
14
iuiiH
The I Iliac IV is the biggest and most
extraordinary computer in the world, knock
wood. To most computer people it's as big as
anything they want to think about.
The Illiac 4 consists of sixtv - four big¬
gish computers, all going at once under the
supervision of yet another big computer, typ¬
ically all working on a single problem. It
is the brainchild of Daniel Slotnick, who
worked on the theory of array computers and
pressed for its creation for years; eventually
built by Burroughs, it sits at an airbase but
is available to outside users through the
ARPA network.
In principle the idea is this; certain
classes of problems, especially those involv¬
ing very large arrays and matrices, can be
run only rather slowly on ordinary computers.
If, however, a computer is built which itself
is an array, certain operations can take - place
very much faster because they happen in paral¬
lel units simultaneously. Matrices, partic¬
ular formal kinds of array, arc used in a
great variety of mathematical-type applications.
For instance, weather prediction. It seems
that the theory of weather prediction has been
well worked out for decades, but because the
swirly behavior of the atmosphere is so intri¬
cate, actually calculating out everything in¬
volves billions of operations. At one confer¬
ence session I believe it was explained that
it used to take twenty-five hours to predict
the weather twenty-four hours in advance, whi
which means you get the answer an hour after
it's happened already; now it is possible,
using Illiac IV, to do the whole planet's wea¬
ther in an hour and a half, said the speaker.
Some say that may be its only use and
the whole project was inadequately thought
out. Others suspect it's really intended as
a radar-watcher for the ABM system.
Anyway, there it is. And the individual
briefcase-sized Burroughs machines, if they're
ever marketed, may provide a new price break¬
through for smalt highpower systems.
/-/
Incidentally, "Illiac" is the traditional
name for computers built at the University of
Illinois. Will the series end with this one?
BIBLIOGRAPHY
Daniel J. Slotnick, "Unconventional Systems "
Proc. SJCC 1967, 477-481.
Bibliography: Jack A. Rudolph, "A Production
Implementation of an Associative Array Pro¬
cessor— STARAH," Proc. FJCC 72, 229-241.
Contact: Computer Division Marketing, Goodyear
Aerospace Carp. Akron, 0. 44315.
An interesting but little-known computer
was the Ambilog, made by Adage, Inc. of Bos¬
ton, a most inno-'ative machine first marketed
in the mid-sixties.
The Ambilog is a hybrid computer, i.e.
both digital and analog ( Analog Compu¬
ters, p. II) , it was mentioned that "analog
computers" are any electrical circuits set up
to produce a result according to some formula).
For certain types of repetitive functions,
analog makes a lot of sense. Thus the Adage
people put this machine together for highly
efficient hybrid computing.
The essential idea was to have a highly
ventilated machine that could take in and put
out measurable electric signals at high rates.
What they created was a rather straightforward
digital computer with a lot of registers and
converters to send analog information out and
bring it back in. This meant that problems
suited to repetitive electrical twisting and
measurement could gush out through special
analog circuits, and the "answers" or doctored
signals could gush back in.
The instruction-set was designed for this
high-speed management of input and output.
The principal applications this equipment
has been used for are three-dimensional dis¬
play )see Adage Display, p.Ji^O 0 ) and Fourier
analysis for sound and other applications (sec
P- Wa. r 3Ml)
Now that integrated circuits are getting
cheap, the distinction betweon registers (where
things happen to information) and memory (where
nothing happens to information) can be recon¬
sidered. Storing information in colls that can
themselves perform actions, or having numerous
subsystems in which computation takes place,
leads to a fascinating variety of possible ar¬
chitectures. Theae are generically called
"cellular* computers; this ia slightly ironic
considering that the living cell itself is now
known to oe at least a digital memory, and prob¬
ably more (see p. U>0 ).
examples of cellular computera m-.-.a or loss
include STARAH, ILLIAC IV and the author 1 a own
hypothetical FANTAS*J fcn (see p!*\5j). But this
type of architecture has barely be-pin.
I
I
!fii
11! ?
if
32
:hl if
I l ?!
3 S II • 2-
S u S e * -5
§1
6”
5 1
J
gs 15
f; | i
-J?
* CoS
z | :o '3
c £
S I ||f
II
E 5r2!§
SS'BlS
- S *1*
\
ra
ii
ijt
j!i
ill
£ ! 1
& S l
H
il
| - f
ll*
H s
in
■ HHERc id (Ser -
u hr * * • h o& afe-re-vy.
||I
m :
f!“ s l\
c - n “ i <=
III! |i
j»;I g a
!
II
h
II
e-:
35 |
ii
|!
if!
Ill
1*1
II
!ij
SHjt
ns
i if
3 *“ °
11
j]
If
ill
Iii
I
I have heard no computer more widely
praised among computer people than the Bur¬
roughs 5000 (replaced by the S500). The 5000
was designed about 1960 hy Edward Glaser and
Bob BaYton. It was designed to be used only
with higher languages , not allowing program¬
mers access to the binary instructions them¬
selves. Indeed, it was particularly designed
to be used with ALGOL., which would have been
the standard language if IBM had allowed it
(see p. ‘SI ) and is still the "international"
language.
Because of this approach, its main regis¬
ters were to be hidden from the programmer,
and attention centered instead upon the stack ,
a high-level programming device (see bo* on
Stacks). However, index registers were added
to make it better for Fortran.
The 5000 was marketed as an "all-purpose”
computer with an operating system, anticipating
IBM's 360 of a few years later. Indeed, after
the 360 was announced, Burroughs sales picked
up, because IBM salesmen were at last-promoting
the concepts that customers hadn't understood
when they heard about them from Burroughs
salesmen years before.
Bigger machines in the line are now the
6500, 6700...
The Burroughs Corporation continues to
be an acknowledged leader in computer design.
Apparently their sales force is something else,
unfortunately. I once spent some time with a
Burroughs salesman who not only knew nothing
about the magnificent structure of the machine
he represented, but would not get me further
information unless I demonstrated that the
company’I represented (a large corporation)
was seriously interested. He wore very fancy
clothes.
i?
d) unx
TMe me s .
The Stack is a mechanism-- either built
into the computer ("hardware") or incorpora¬
ted in a program ("software") which allows a
computer to keep track of a vast number of
different activities, interruptions and com¬
plications at the same time.
Basically, it is a mechanism which allows
a program to throw something over its shoulder
in order to do something else, then reach hack
over its shoulder to get back what it was
previously working on. But no matter how many
things it throws over its shoulder, everything
stays orderly and continues to work smoothly,
till it has resumed everything and finished
them all.
It goes like this: if the program has
to set aside one thing, it puts that one thing
in core memory at a place specified by a
number called a stack pointer . Then it adds
one to the stack pointer, to be ready in Case
something else has to go on the stack. This
is called a PUSH.
"rurr
When a program is ready to resume a prev¬
ious activity, it subtracts one from the
stack pointer and fetches whatever that stack
pointer points to. This is called a POP.
the addresses of programs, data we are moving
between programs, intermediate results, and
codes that show what the computer was doing
previously.
Using stacks, programs may use each other
very freely. It is possible, for instance,
to jump among subroutines-- independent little
programs-- willy-nilly, using a stack to keep
track of where you've been.
In this case the stack holds the previous
locations and intermediate data, so that the
program follower can go back where it came
from at the end of each subroutine.
ST*CK
AsWanmuiG.
^r^up.
and recursive' programs, meaning programs
Stacks are also used for handling "interrupts"
-- signals from outside that require the
computer to set aside one job for another.
Having a built-in hardware stack enables the
interrupts to pile up without confusion:
ill cure memory. As a sil
on a hypothetical raachin
to handle
On this machine,
to a program and
let's say, this gets compiled
a stack:
Then the operati
stack itself:
.
tM3 rof ~p=t
Stack programming tends to be efficient,
particularly in its use of core memory.
Some languages, such as Algol and TRAC
Language, require stacks.
Some computer companies, such as IBM,
resolutely ignore stack architecture, though
hardware stacks have become widely adopted
in the field.
In electronics, a "bus" is a common
connector that supplies power or signals to
and from several destinations. In computers,
a "bus" is a common connection among several
points, using carrying a complex parallel
signal.
The Grand Bus, a new idea among computers,
is catching on. (The term is used here be¬
cause the colloquial term, "Unibus," is a DEC
trademark.)
Basically the Grand Bus is a connector
of multiple wires that goes among several
pieces of equipment. So far that's just a
bus. But a Grand Bus is one that allows the
different pieces of equipment to be changed
and replaced easily, because signals to any
common piece of equipment just go out on the
This means that the interface problem
is deeply simplified, because any device with
a proper bus interface can simply be plugged
onto the bus.
It does mean a lot more complexity of
signals. The Unibus, for example, has about
fifty parallel strands. But that means var¬
ious tricky electrical dialogues can rapidly
give instructions to devices and consider re¬
plies about their status, in quick and stan¬
dardized ways.
Prominent grand buses include:
The PDP-11 is not a beginner's computer.
But the power and elegance of its architecture
have established it, since its introduction in
1970, as perhaps the foremost small computer
in the world.
Actually, though, we can't be too sure
about the word "small." Because as successive
parts of the line arc unveiled, it becomes in¬
creasingly clear that this line of "small"
computers has been designed to include some
very powerful machines and coupling techniques
among them; and it would seem that we haven’t
seen everything yet.
1 U
IL
(it MO
In other words, DEC's PDP-11,
which has already cut into sales
of their PDP-8 12-bit series ond
PDP-1S 18-bit series, may soon cut
into its PDP-10 36-blt series-- as
designer Bell unveils (perhaps)
monster PDP-lls in arrays or double
word-length or whatever.
The PDP-11 was designed by C. Gordon Bell
and his associates at Carnegie-Mellon Univer¬
sity. In designing the architecture, and es¬
pecially the instruction-set, they simulated
a wide variety of possibilities before the
final design was decided. The resulting ar¬
chitecture is extremely efficient and powerful
(see box, "The 11's Modes").
The Hova bus (nameless; the first?)
PDP-11's Unibus
Basically it is a lb-bit machine, with
nost instructions operating on 8-bit data as
well.
There are eight main registers. Two,
though, function specially: the program coun¬
ter (that part of the program follower that
holds the number of the next instruction), and
the hardware stack pointer, both follow the
same programming rules as the main registers--
an unusual technique. Thus a jump in the pro¬
gram is simply a "move" instruction, in which
the next program address is "moved” into main
register *7, the program counter.
In addition, all external devices seem to
the program to be stored in core memory. That
is, the interface registers of accessories
have "addresses” numerically similar to core
locations-- so the program just "moves" data,
with MOVE instructions, to doorways in core.
(This is facilitated by the automatic handling
of previously bothersome stuff, like Ready,
Wait and Done bits.j
Physically all devices are
to a great sash of wires called
Grand Bus box.)
simply attached
a Unibus. (See
R.W. Southern, PDP-11 Programming
Fundamentals . (Programmed work-
fool"! Vo price listed.) Algon-
PDP-11 lookalikes are
sold by Cal Data. Other firms
have been scared off by DEC'S
patent, but Cal Data say they
have a patent too.
Lockheed SUE'* Infibus
PDP-8*> Omnibus.
The idea is great in general. For your
home audio equipment, for instance, Grand Bus
architecture would simplify everything.
Not only that, but Detroit is supposedly
going to put your car's electrical system on
a Grand Bus. This will mean you can tell at
once what is and Isn't working, and hook up
new goodies easily.
-W ll'f
iMs&kl
problem In mini architecture 1* how to cram Into
the Instruction enough choices tor ftttint around
in core memory.
In designing the PDP-11, Cordon Sell and hia
co-worksrs systematically sought a powerful sol¬
ution, simulating various possible structures by
computer program, trying out a variety of differ¬
ent combinations and structures.
The slsgance and power of the solution are
little short of breathtaking. Saslcally the PDP-
11. the final design, providss savan different
types of indirect addressing. The cos^utar's
information (the usual technique, hare called
mode aeroI, or to point to locations to be oper¬
ated on (indirect nodes 1 through 7). Thass
provide extremely efficient naans for stepping
through tables, push and POP, dispatch tablas,
and various other programing techniques. The
following diagram la meant for handy reference.
(5i V«K If, !>«b, 8 Lfr, i UjJ
"Ho corporation areept IKK eowld eel l a aaqruttr like thit." — x friend.
The IBM 360 (now called 370 because we're in the 70s) is
the commonest and most successful line of computer in the world.
This does not necessarily mean it is the best. There are those
who appreciate IBM typewriters but not their computers.
360s are bought because the repair service is great; be¬
cause IBM has very tough salesmen; and possibly for other rea¬
sons (see pp, S2-4).
A strange unseen curse seems to haunt the 360 series; in¬
deed, some cynics even think it results from deliberate poli¬
cies of IBM' Yet the 360 (and its software) seem somehow or¬
ganized to make programs inefficient and slow; to make programs
big. needing lots of core memory (with numerous enticements for
the programmer to take up more); to prevent the compatibilities
that are so widely advertised, except through expensive options;
to make things excessively complicated, thus lacking in both tts
customers and the employee* of Its customers to practices and
intricacies that are somehow unnecessary on other brands of
The design of the 360, which was basically decent, is gen¬
erally attributed to Amdahl, Blaauv and Brooks. Those who hate
it, and there are many, base their complaints largely on the
restrictions and complications associated with its operating
system OS, which is notoriously inefficient (see p. 15 ).
The architecture of the 360 was quite similar to the POP-6
(now the POP-10), designed about the same time; sixteen main
general-purpose registers of over thirty bits, and using the
16 main registers as either accumulators or index registers.
A curious form of addressing was adopted, called "base-
register addressing." This had certain advantages for the oper¬
ating system that was planned, and was thought to be sufficient¬
ly powerful that you wouldn’t need Indirect Addressing. Two
main registers were required, one holding a "base" more or less
equal to the program's starting address, and an "index register,"
whose contents are added to the base to specify an address.
Often a third number, or "offset," is added as well.
The idea of this technique is that programs can be "relo¬
catable,” operating anywhere in core memory. A few instructions
at the beginning of each program can ascertain where it is run¬
ning from, and establish the Base accordingly.
The basic idea of the 360 seems to have been doped out for
multiprogramming, or the simultaneous running of several pro¬
grams in core, a feature IBM has pushed heavily with this com¬
puter.
WHAT'S WRONG WITH THE 360?
The main differences between the 360 and the PDP-6 and 10
represent conscious and legitimate and arguable design decisions.
To fans of the PDP-6 and 10, here are the 360's main drawbacks:
NO INDIRECT ADDRESSING. This was because, within the ad¬
dressing scheme adopted, indirect addresses could not be adjusted
automatically. (But it also makes programs more inefficient,
thui more profitable to IBM.)
NO STACK.
Brooks In the II
15000 PDP-U*-“
money on prograi
Too cxpensivi
t would have i
. said Amdahl, Blaauw and
Funny, they have stacks on
ived everybody a lot of
NO MEMORY MAPPING (except on certain models). Where the
PDP-6'a successor, the POP-10, automatically takes cere of re¬
distributing addresses In core to service evory program as if
it were operating from location zero on up, the 360 left this
general problem to local programmers and (on certain levels) to
operating systems.
Handling thia automatically In the POP-10's hardware ob-
?*** complications of base-index addressing and makes pos¬
sible the efficiencies of Indirect addressing.
LOOKALUES
360 lookalikes were sold by RCA and Uni vac. Now that RCA
Mda° n *' r Mk<> * “■P' 11 *”* Ul » iv » c i» servicing the ones they
Corp. is coming down tSe pike with a super-360 of his own, in
part backad by Japanese money. It will be bigger then IBM's
*' » n<1 cheaper. (See Hesh Wiener, "Outdoing IBM: the
end now head of the Amdahl
Amdahl Challenge,” Computer Deci
Instructions can be executed at light¬
ning speed, much faster than the usual micro¬
second or so. However, since core memory is
much slower than the main registers, a trick
is used: program instructions are drawn from
core into a superfast instruction list loften
called a cache )■ and any Jumps or loops with¬
in this seven-word cache can be executed at
unthinkable speeds-- perhaps tens of millions
of times per second.
It was never sold commercially. A dozen
or so were made up specially out of DEC mod¬
ules and dealt out to various scientists, and
the general hope was that DEC would take the
machine up ns part of its product line, but
that's not what happened. DEC instead pushed
its PDF-8 and gave us instead, by and by,
ik I3HC-S
The machine is especially geared for
floating-point numbers (see p. OQ). Because
of the intense speed of the fast instruction
cache, many instructions (such as nulciplica-
plished faster by a short program than if
they had actually been wired" into the computer.
They 6600 became the start of a whole
line, including the 6400, 6800 and others*
The 6400 is used by PLATO (sec p.>hlt'f]).
*fMA
P b L; t‘)
DEC was offered the option of building
Lincoln Laboratories' classic LINC, but deci¬
ded instead to combine it, in the mid-sixties,
with the already-successful PDP-8. That way
all the PDP-8 programs and most of the LINC
programs would work on it. The result is kind
of strange, but very popular in biomedical re¬
search: two computers in one, handing control
back and forth as needed. You can write pro¬
grams on the Line with sections for the 8, and
vice versa. Hmm. A more recent and slicker
version is called the PDP-11.
While you might hal(-think that both
sides of the computer could work simultaneously,
giving you double speed, it doesn’t work that
way. There's only one core memory, and that
sets the basic speed; cither a FDP-a instruc¬
tion or a Line instruction can be underway at
once, but not both.
Nevertheless, we see here the double
structure that plays such an important part
In highly interactive computer displays (see
p, )• Indeed, Line programmers often
use the machine just that way: the PDP-8 run¬
ning an actual program, the Line part running
the CRT display in conjunction with it.
The baelc design of the Nova ia sleek
and simple! four main registers, no stack,
well-designed instructions. Moreover, it
was (I think) the first computer to be built
around a Grand Bua (no' UO15J) , a design which
has caught on rather widely.
Data Ceneral (the company mentioned)
haa used a very intereating marketing strat¬
egy. Instead of bringing out a variety Of
new computers as time goes on, they concen¬
trate on making the Nova faster and smaller.
They began by competing against DEC— es¬
pecially in "the OEM market," purchasers who
•re burying minicomputers in larger equipment
they in turn make-- but more recently they
have actually atarted to market against IBM
with buainaaa systems . In recent montha,
Data Ceneral ads have ridiculed tho complex¬
ity and myatery of XtUi ayatems , arguing quite
rightly that minicomputers programmed in
BASIC are a reasonable alternative for e wide
The Nova'a instruction-set Is clean
and straightforward. key esemples (firet
bits only)1
OOOOO Jump (thus an all-aero in¬
struction Jump# to loc if)
UWK )X Subroutine jump
OOOXO Increment, skip if sero
OOOXX Decrement, skip if aero
OOX Loed AC
UXO Stars AC
X Instructions among registers.
A horrifying and weird
picture of an experl-
mental monkey sitting
on a PUP-12 and making
like the Creature from
the Black Lagoon is
to be seen in Time, 14
Jan 74, p. 54. It
BIBLIOGRAPHY
The classic book: C. Cordon Bell and Allen
Newell, Compute r e structures :^ Readings
Note that Bell designed various
of the POPs, and Newell pioneered in
list processing (see p. 2.C, ).
Computer Characteristics ^ KevIe^ keeps you^
computers and peripherals. $25/year
(3 issues) GML Corp., 594 Marrett Rd.,
Lexington, MA 02173.
Other firms, such as Auerbach,
offer more expensive service* of the
B. Better, The Architecture and Engineering
of DlgTTil ~ rompu'te'r" CoapTTxes . Plenum
P7e*s" 2 vols., 540.
Heavier than Bell and Newell. A
catalog of thousand* of structures and
tricks, emphasizing the tradeoffs among
them.
One competitor. Digital Computer con¬
trol*, eella a Nova lookaliks. whether Data
General will Bell you Ite program* to run on
it ia another queation.
Jt>Mi
ewGwnp
Here, then, are some thumbnail descrip¬
tions of some great, classic or popular com¬
puters, expanding our basic diagrams as needed.
Individual computers represent variations
of the patterns shown so far.
The particular structure of registers,
memories and pathways among them is called the
architecture of a computer (see p. 32, ). The
binary instructions available to the program¬
mer are called the instruction - set of the
particular computer (see p<35)* (The word
"architecture" is often used to cover both,
including the instruction-set as well.)
The principal variations among computers
are the word length (in bits-- see "binary
patterns," p-3^) and the number and arrange¬
ment of main registers. Then come the details
of the instruction-set, especially the ways
in which items are selected from core memory
-- the addressing structure. Then the instruc¬
tion-set, whose complications and subtleties
can be considerable indeed.
The individual computer is the complex
result of all of these. If they fit together
well, it is a good design. If they fit to
gether poorly, it is a bad design. A bad de¬
sign is usually not so much a matter of overt
stinky features as of ramifications which fit
together disappointingly. (Glitch is a term
often used for such stinky features or rela¬
tionships.)
The possible ways of organizing computing
hardware are vast, and only partly explored,
(An aside to computer guys: on the Intel chip
debugging consoles they have an address trap
(trapping on a presettable effective address)
and a pass counter (trapping after n passes).
How come we haven't seen these sooner?)
The machines mentioned here are an arbi¬
trary selection. Some of them are the Great
Numbers, computers so important that folks use
their numbers as proper nouns, with no brand
name:
"Do you have a 360 up there?"
"No, but there’s a 6600, a 10 and a
bunch of 8s."
"Personally, I'd rather work on a 5500."
Here is what they are talking about.
The IBM 7090 was the classic computer.
Introduced about i 960 and mostly gorto by '66,
it was simple and powerful, with clean and
decent instructions. With its daughter the
7094, it became virtually standard at uni¬
versities, research institutions and scien¬
tific establishments. At many installations
that went on to 360s they long for those
clearminded days.
The 90 had three index registers and
fifteen bits to specify core addresses.
(This meant, of course, that core memory
could ordinarily be no longer than 32,768
words ("32K"— see "Binary patterns," p.U’J.)
A later model, the 94, went up to 7 index
registers, since there were three bits to
select them with.
Ik
f*Ui
A 4^6
The PDP-8 was designed by Gordon Bell
(in its original version, the PDP-5) about
I960. Originally it cost about $2S,OOG; as
of May 1974 that price is down to about $3000,
® r ls*s than a thousand dollars if you want
to buy the circuits and wire it all up your¬
self. Tup, here comes that Heathkit.
The PDP-8 has been DEC 1 s hottest seller>
you'll find them in industrial planta and
museums, or even hidden in the weirdest equip¬
ment, from typesetting devices to big disk
drives. At universities all over there are
kids who know them inside out.
Today the PDP-8 aeema archaic, with ita
one accumulator and awkward addressing schemes!
you can only get to 2^6 different addresses in
core memory directly, and it's chopped up into
pages. But for its time it was a brilliant
design, packed like a parachute, and even to¬
day there are people who swear by it. (But
look at what Bell's done lately! the PDP-11.)
So many programs exist for the PDP-8,
though, and so much sentimental fondness, that
ft will be with us for the foreseeable future.
Thus the "Ducky's Wrist watch" example («««»>.
is not totally frivolouai we may assume
that a PDP-8 on one or two wri*twatch-sized
chips is only a year or so away. But let's
hope they do the 11 firet.
(Lookalikes available from Digital Computer
Controls and Fabri-Tek.t
Though these were million-dollar ma¬
chines ten years ago, you now hear of them
being offered free to anyone who'll cart
them away; partly because they needed a lot
of power, airconditioning and oso on. But
they were great number crunchers. (If you
want a 90, I believs that 90 lookalikes are
still available from Standard Machines in
California.)
m.
Univac's 1106 and 1108 are fast, highly
regarded machines. In designing the computer
Univac did a clever thing: they built an up¬
graded 7094. This meant (as I understand it)
that all the programs from the old 7094 will
run on it. But instead of two main registers
they have 28.
(Where they found the bits in the instruc¬
tion word to select among all those registers
I can't tell you.)
The 1108 is a larger version, with twice
as many main registers.
DEC'S PDF-10 is in some ways the standard
computer that the IBM 7094 was in the sixties.
scientific
The PDP-10 is excellent for making highly
systems, since it can respond to every input ch
typed by the user.
interactive
aracter
, 1S ,? favorite big computer among research people
and the well-informed. The ARPANET, which connects big
computers at some of the hottest research establishments
is largely built with PDP-lOs. There are PDP-lOs at MIT ’
U. of Utah, Stanford, Yale, Princeton and Engelbart's shop
(see p. JkfC,). The ■Watkins Box (see p.^}) hooks to a 10.
Digital Equipment Corporation, aware that its computer
trademark PDP” connotes minicomputers to the uninformed
now wants the 10 to be called DECsystem-10 rather than PDP
We'll see if that catches on.
Who designed it is not entirely clear,
people attribute it variously to the Model
at MIT, to Gordon Bell, and one Alan Kotok.
I’ve heard
Railroading Club
Originally it was the PDP-6, which appeared about 1964,
and was the first computer to be supplied with a time-sharing
system, which worked from the beginning, it rockily. Now
it's good and solid. DEC’S operating system for it (see p.
45) is called TOPS, but BBN sells one called TENEX, also
highly regarded. The 10 does time-sharing, real-time pro¬
gramming and batch processing simultaneously, swapping to
changeable areas of core memory. (This feature should soon
be available, at last, on IBM computers ("VS2-2").)
PDP-10 time-sharing works even if you don't have a disk,
using DEC tape (DEC'S cute little tapes). Of course, without
disk it's really hobbling, but this capacity is nevertheless
noteworthy.
The PDP-10 has debugging commands which work under time¬
sharing and with all languages, and hugely simplify program¬
ming.
Unlike the IBM 360, whose hardware protection comes in
options, the 10 has seven levels of protection: the user can
specify who may read his files, run them, change them, and do
four other things. The PDP-10 does have job control commands
but they are not even comparable in cumberosity to IBM's JCL
Language (see p. 31), and they are the same for all three
modes of operation: time-sharing, real-time and batch.
The PDP-10 has 36 bits but has instructions to operate
on chunks, or bytes, of any length. It has sixteen main reg¬
isters, as does the 360, but uses them more efficiently.
The PDP-10 also has unlimited indirect addressing: an
instruction can take its effective address from another lo¬
cation, which can in turn say to take its effective address
elsewhere, ad infinitum. For your heavy tight elegant stuff.
Perhaps most important, the 10 has a full set of stack
instructions (see "The Magic of the Stack/' p» 42), allowing
programmers to use multiple stacks for purposes of their own*
(The operating system's own stacks are protected.) Program-
mers do not have to save each other's registers, as on the 360
Programmers are relatively safe from each r
other.
Wit
raP-io
iwrntMtioi
wlVVcr
Some think of the PDP-6 and 10 as a glorified 7094 (with
18 addressing bits, instead of 15). In this case we might
consider the 360 a stripped- down version of the 6, since IBM
threw out the stack and in most models the memory mapping.
PDP-lOs are ordinarily sold where the views of scientists
and engineers are considered important, and comptrollers do
not have first choice. Nevertheless, some say that its busi-
ness-programming facilities (i.e., COBOL, duh) are just as good
as those - J ~ 1 ~ ; ~ *"
"for
as those of companies who claim to have designed computers roi
all purposes." First National City Bank of New York has found
that the PUP-10 makes a splendid banking computer for internal
use, profitable at an internal charge of 53.75 an hour plus
processing charges. Prices for a PDP-10 system with disk start
start about 5500,000, or 515 grand a month, and go up into "be
millions.
However, DEC salesmen are not like IBM's, who can reputed¬
ly sell Eskimos to iceboxes. For one thing, DEC salesmen are
on salary. That fits DEC’S demure, aw-shucks image, but it
doesn't exactly sell big computers.
(For you Firesign Theater fans, the mutterings of the
dying computer on the "Bozos" album are various PDP-10 syste
thingies, artistically juxtaposed.)
59
-w LV utr iraaiuonal for
machines 1 ike this to have many many
JSTin .M S*”* UghtS f Sh ° Win * Wh ^
was in all the mam registers at any
fraction of a second. But there's Y
really no point in seeing all that
since about all you can tell from It
is whether the computer is going or
no ^ {if J it 's not, the lights are stop-
g*? 1 other high-level impressions.
For that reason some big computers,
beginning with the CDC 6600, started
doing away with the fancy lights and
bringing written messages to the op¬
erator on a CRT scope instead (for
lots more on the glories of CRTs
see the flip side, pp. 2.'^ *
Big computers can have multiple
program followers and sets of regis¬
ters (a program follower and its
" a , 1 , n agisters are together called a
CPU, Central Processing Unit). A
computer with two CPUs, i.'e., two
sets of program followers and regis-
ters to carry the programa6ut, is
called a dual processor; a computer
with more than two CPUs is called a
multi-processor.
Separate independent sections of
core memory may be put in one computer,
allowing separate program followers
and data channels to work at the sane
time. (Note: a "bank" of core memory
is an independent section. Except in
this sense of "core memory bank" or
"core bank," there is no other correct
usage of the layman’s vague term
"memory bank." Computer people only
say "memories," and distinguish fur¬
ther among core, disk, tape, etc.
Note that "data banks" are a separate
issue-- see "Issues," p.f? .)
DINOSAURS?
Many computer people, the author
included, entertain certain doubts a-
bout the long-term usefulness of big
computers, since minicomputers are
cheaper, especially in the long run,
and can actually be in the offices and
homes where people create and use the
information. Big computers are neces¬
sary for time-sharing (see p.45) and
huge "number-crunching" jobs (see
"Grosch's Law," nearby). However, it
will soon be cheaper to put standard¬
ized number-crunching jobs in stand¬
alone or accessory hardware; see "Mi¬
croprocessors," p.
Fans of big computers also argue
that they are necessary for business
programming, but that only means tra ¬
ditional business programming-- non-
mteractive and batch-oriented. For
tomorrow's friendly and clear business
systems, networks of minis may be pref¬
erable. But makers of big computers
may be unwilling to admit this possi¬
bility.
GlW.S(A'U
Minicomputers are so nifty that we may ask
why have big computers at ail. The answer is
that there arc considerable economies, especially
in applications that require many repetitive oper¬
ations and don't need interaction with users.
A hypothesis about the economy of big
computers was formulated a long time ago by
Herbert J.R. Grosch, onetime director of IBM's
Watson Lab and now a heavy detractor of IBM.
Thus it is called Grosch's Law. The idea is
basically that there is a square-law relationship
between a machine's size and its power (narrowly
defined in terms of the coat of millions of operations,
and withou t considering the advantages of interactive
systems or other features which may be of more
ultimate valu^. Anyway, when I asked him recently
for his formulation of Grosch's Law, 1 got the fol¬
lowing:
’ Grosch'a Law (formal): Economy in computing is an the
square root of the speed.
(informal): If you want to do it ten limes
as cheap, you have to do it a hundred times
as fast.
(interpretive): No matter how clever the
hardware boys are. the software boys piss it away’
38
^BIGGIE
The operator muses at the console of the main computer at the University
of Illinois at Chicago Circle. It is an IBM 370 model 150, which rents for
about $50,000 a month, including all accessories and a dozen or so terminals
— in the parlance of big-computer people, a "medium-sized installation."
This is a big computer.
In principle it’s no different from a small one; but it has
bigger memories, more registers, more program followers. There
are more specialized parts and more things happening at once.
(Thus the term ’’digital computer complex" is sometimes used for
a big computer.) It comes supplied with a monitor program or
operating system (see p. •)$) an d a variety of other utility pro¬
grams and language processors.
Biggies have many ominous and seemingly incomprehensible
things to scare the layman.
For one thing, where is the computer? All you see is a lot
of roaring cabinets. WhicIPis it?
Answer: all of them. "The computer” is divided among the
different cabinets (note diagram and cluster of pictures locating
the operator among them, below). The external devices or peri¬
pherals (see p. S'7) are usually in separate housings. Usually
there is one single box or "mainframe" containing core memory,
main registers, program-following circuitry, etc., as in the ma¬
chine illustrated, but these things don’t have to be in one box,
and sometimes aren't.
Operator's console of
this particular setup.
The operator may use the
keyboard or light-pen
(see p. (iK\* 23) to select
among waiting programs,
submitted by various
programmers and depart¬
ments -
The parts of a computer are set
up to be gotten at , to be refilled and
repaired. Their innards swing open
like refrigerators. Similarly, the
wiring of computers is in separate sec¬
tions or modules ("module" merely be¬
ing today's stylish term for "unit"),
having very orderly connections among
them. Individual circuits are on cir¬
cuit sheets or"cards" which plug in
sideways and may be replaced easily.
There's nothing really computerish
about this, it's merely sensible con¬
struction; but it is traditional in
other fields to build something as a
tangle of wires. (When'TV makers fol¬
low these rational practices, they
call it "space age construction.")
Why are the different parts so
far apart? So there’s room to swing
them open, refill or change them, sit.
down and repair them. Refrigerators
could, and perhaps should, also be
built in separate sections, but it’s
not traditional. Automobiles can’t
be spread out because they have to en¬
dure the jostles of the road. But
computers like this baby aren’t going
anywhere.
Also intimidating is the fact
that you have to step up as you enter
a computer room. That T s because com¬
puter rooms ordinarily have raised
floors, permitting cables to be run
around among the pieces of equipment
without your tripping.
Computer rooms are generally lit
by millions of fluorescent bulbs,
making them garishly bright. This is
simply tradition.
Big computers can have millions
of words of core memory. Moreover,
there are usually several disk drives
and tape drives, as seen in the pic¬
tures, used to hold data and programs.
(Some of the programs are the system
programs, especially the language pro¬
cessors and the operating system--
see p. but other programs and
most of the data belong to the users.)
AN OPERATOR IS NOT A PROGRAMMER
Cindy Woelfer is the day-shift operator of Circle's big computer.
The job mainly consists of changing disks and tapes, starting and stop¬
ping different jobs listed on the scope, and restarting the computer
when the system crashes (gratuitously ceases operation).
Ms. Woelfer, a thoughtful person, says she does not find her job
very stimulating. She can program, but the job doesn't involve pro¬
gramming. It's also a lonely job. Non-systems people, except Mayor
Daley, aren't ordinarily allowed around. About the only people to talk
to are the systems programmers who stop through to look at the scope
and see whether their programs are up next.
37
minicomputer or mini
Traditionally, any computer hav¬
ing an architecture (memory and
main registers) of 18 bits or
less. Lately, unfortunately,
some people have been adver¬
tising their 24-bit and even
32-bit computers as minis. This
is just confusing.
(They base this on the fact
that ‘’minicomputer" has also re¬
ferred to a machine sold without
a lot of programs. But that's
really a separate issue.)
microprocessor
Two-level computer (see p. Y*/ ) •
microcomputer
Crummy term apparently being used
to mean any tiny computer, regard¬
less of its structure. Thus all
computers will be "microcomputers”
in a few years. This clarifies
nothing as to their structure or
use.
midi computer
Remember midi skirts? Well, this
term has been used for computers
larger than 16 bits or faster than
usual, by people seeking to give
the impression that their machines
are bigger than minis and less than
biggies. Even the PDP-10 (a genuwine
biggie) has sometimes been called
a midi.
A product called Cling Free
comes scented in a spray can,
for preventing static in your
laundry-- is said to eliminate
static electricity in carpeted
computer rooms. Spray it all
over the rug, especially near
the computer, and you won’t
zapp the computer with sparks
from your fingers.
WHER5 T«6Ef ty[.
HEY, SOME MINI RENTALS MAY BE REASONABLE
Nova minicomputers are leasable from:
Rental Electronics, Inc.
(a subsidiary of Pepsico)
99 Hartwell Ave.
Lexington, MA 02173
for as little as $250/mo., long-term .
is at the bottom of p. 7_5,
A long but incomplete list of minicomputer manufacturers
-B^Kf OF OKI & NUVJI v*-?TL [-uf o*u*| Tetehjpt
chimneying and twisting to squeeze through
to his goal— not his body, of course, but
his program.
36
This is a PDP-11, one of the world's best-designed minicomputers (see p. ‘flu)
The PDP-11 is a 16-bit machine. Shown is Model 45, the fastest PDP-11, which
has various special features. Stripped, with 4K of core memory (that's 4096
locations), it costs about $13 grand. A smaller PDP-11 goes for some $5000.
A minicomputer simply means a
small computer, no different in
principle from the big ones (see
next spread), and it can do all the
same things except as limited by
speed and memory capacity.
(Mind, we are talking about
real computers , not the little cal¬
culators you hold in your hand that
just do arithmetic. A real compu¬
ter is one which works on stored
programs and all kinds of data,
working not merely on numbers but
on such other things as text, mu¬
sic and pictures if supplied with
appropriate programs; see flip side.)
There is some argument over
what constitutes a minicomputer;
basically we will say it's any com¬
puter with a word length of.18 bits
or less (see "Binary Patterns," p.
<2-7) • (Some companies, like Data-
craft and Interdata, are trying to
peddle their worthy computers as
"minicomputers" even though they're
24 and 32 bits, respectively, but
that's very odd. Interdata says
any computer under ten thousand is
a mini-- which means all computers
will be minis by and by; a vexing
thing to do to the term.)
Traditionally minicomputers
come with much less. In the old
days pretty much all the programs
you got with it were an assembler
(see p. 35) and a debugger (see p.
Jo) and'a Fortran compiler (see p.
if you were lucky. Today,
though, with minis having highly
built-up software like (see p fio-ifZ
for descriptions) the PDP-8, the
PDP-11 and the Nova, you can get a
lot of different assemblers, to¬
gether with Fortran, BASIC, and a
little disk or cassette operating
system (see p. H&) to make your
life a little easier.
The idea of owning a computer
may* seem strange to some people,
but with prices falling as they are
it makes perfect sense. Numerous
individuals own minis, and as the
price continues to drop the number
will shoot up. For several families
with children to pool together and
buy one for the kids makes a lot of
sense. One friend of mine has an 8,
another is contemplating an 11.
(I've been trying to get my own for
years; perhaps this book...) Any¬
how, the general price range is now
$3000 to $6000 plus accessories,
and that's dropping fast. Rental
is usually a great mistake: prices
are very high and after six months
or so you'll have paid for it with¬
out owning it. (But names of rental
places will be found in this book,
and some of-them may offer good ar¬
rangements.) Minis may now be had
in quantity for $1000 each-- price
of the PDP-8A in May 1974-- and soon
that will be the consumer price.
Unfortunately, the price of the
computer itself is dropping faster
than that of the accessories, such
as the basic terminal you'll need,
which still weighs in at $1000-5000.
Moreover, as soon as you want to do
anything serious you'll need a disk
(starting around $4500) or at least
a cassette memory (starting around
$1500). But these prices too will
come way down as the consumer market
opens.
Some of us minicomputer freaks
see little real need for big computers.
Minicomputers are splendid for inter¬
active and "good-guy" systems (see
p. 13) ; ns personal machines, to han¬
dle typing and bookkeeping; even for
business systems, if you recognize
the value of working out your own in
BASIC or, say, TRAC Language.
Minicomputers are being put in¬
side all manner of other equipment
to handle complex control. (However,
for repetitive simple tasks, the lat¬
est thing is microprocessors (see p.
if), which cost less but are harder
to program.)
Minicomputers are now being found
in highschools; active marketing to
highschools is now being done by both
DEC and Hewlett-Packard.
Children's museums in Brooklyn
and Boston have recently obtained PDP-
11s for the kids to interact with. In
the Brooklyn case, the computer will
even demonstrate the exhibit and help
the child discover things about it in
ways worked out by Gordon Pask (see d.
In the future, networks of minis
may be the systems to offer low-cost
information services to the home (for
speculations, see p. £7 )-
But minis will alsi start to make big¬
ger and bigger incursions on the terri¬
tory of the big machines. For instance,
one group proposes a time-sharing sys¬
tem which will simply consist of Novas
interconnected in a ring, the so-called
STAR-RING, which will supposedly com¬
pete with big time-sharing.
Here 's that selfsame PDP-11
in its overall setting. With
peripherals shown, plus the
magnificent Vector General
display (shown later on in
book, p. tH 3l <5 elsewhere),
this setup cost well over a
hundred grand. (This is the
Circle Graphics Habitat, oth¬
erwise known as the Chemistry
Department Computer, U. Illi¬
nois at Chicago Circle. Why
do chemists need such things?
See p. £*\2l.)
The good ol' PDP-8, perhaps
the most popular minicomputer
(12 bits). Full PDP-Bs now
cost about $3000, "kits" less.
Shown here with a Sykes cas¬
sette tape deck — a nice,
rather reliable unit — and a
screen display (see pp^ZZ^Z) *
Courtesy Princeton University .
<S R.E.S.I.S.T.O.R.S. (see p.yj.
Kids love computers.
They belong together.
This lad flips panel
switches on a Nova,
perhaps the third most
popular mini after the
8 and 11 (16 bits ; see
P .
35
This la what the program look* like In the
computer's core memory (A printout
like the following is called a machine -
language Hating )
Since all the addresses are filled In, this
program is said to be In absolute
binary . If they weren't filled in, It
would be called relocatable binary .
Machine language listings come in different
flavor*. A binary listing (or dump )
la generally in ones and aeroes. An
octal Hating groups the bits by threes
and substitutes the numbers zero
through seven for the different com¬
binations of three bits The other
main kind, the hexadecimal listing
or dump (an IBM thing), group* the
bits by fours and substitutes the num¬
ber* 0-9 and the letters A to F, for
the sixteen different combinations of
four bits.
This is what the program looks like when
you set It up for the Assembler,
which la the eaaier way .
A program laid out like this la called an
Assembly Listing. Studying it may
help you debug (see p. ?!)).
An easy-to- remember alphabetical code la
used to represent each final Instruc
tion desired. Such an abbreviation
ia called a mnemonic ; usually they're
more cryptic. The mnemonics ere
turned by the assembler Into the
binary opcode.
You don’t have to know the actual addresses
in core memory, you just use alpha¬
betical names or labels, and the As¬
sembler figures out where they really
go and puts in the binary addresses.
Desired numbers, such as 9, are plugged
into the address pans of Instructions.
YOUR OWN COMMENTS (here set off with
slashes) can stay here loo.
In this FIDO example, the Assembler follows
two common practices; it recognizes
a label because It ends in a comma,
and recognizes a comment because it
begins with a slash.
(jhl-AO. «,
ooo
oox
0X0
oxx
xoo
xox
xxo
XXX
oox ooo
oox oox
OOX 0X0
oox oxx
oox xoo
oox xox
oox xxo
OOX XXX
oxo ooo
oxo oox
0X0 0X0
oxo oxx
oxo xoo
oxo xox
oxo xxo
0X0 XXX
oxx ooo
oxx oox
oxx oxo
oxx oxx
oxx xoo
oxx xox
oxx xxo
oxx XXX
xoo ooo
xoo oox
xoo oxo
xoo oxx
xoo xoo
xoo xox
xoo xxo
XOO XXX
xox ooo
xox oox
xox qxo
xox oxx
xox xoo
xox xox
xox xxo
xox XXX
xxo ooo
xxo oox
XXO 0X0
xxo oxx
xxo xoo
xxo xox
xxo xxo
XXO XXX
XXX ooo
XXX oox
XXX oxo
XXX oxx
xxx xoo
XXX XOX
xxx xxo
xxx xxx
x ooo ooo
X ooo oox
x ooo 0X0
X ooo oxx
x ooo xoo
X ooo xox
x ooo xxo
X ooo xxx
x oox ooo
X oox oox
X oox 0X0
X oox oxx
X oox xoo
x oox xox
X oox xxo
X OOX xxx
X 0X0 ooo
X 0X0 OOX
X 0X0 0X0
X 0X0 OXX
xoxo xoo
X oxo xox
X 0X0 xxo
xoxo xxx
C°Nri\jr$
Bt jj
.. —9
xxxxxooooooo
xxoooooooooo
ooooxxooxxox
xoxoooooooox
xxooooooooox
ooooxxoxooxx
xoxoooxxooxo
xxxxxooooooo
xxooxoooooox <
XX 00X0000X00
xxooxoooxoox
xxooooooooxo
ooooxxoxooxo
xoxoooxxoxxx
xxxxxooooooo
XXooxoooooxo
xxooxooooxxo
xxooxoooxoxo
ooxooxoxoxxx
ooxooxoxoxox
oxxoooxoooox
ooxooxooxxxo
oxxoooxooxxx
oxxoooxxxxxo
xxxxxooooooo
ooxooxoxoxxx
ooxooxoxoxxo
oxxoooxoxxox
oxxoooxxoooo
oxxoooxxxxox
ooxooxooxxxo
oxxoooxoxoxx
oxxooxoooooo
oooooooooooo
ooooxxoxooxx
xoxoooxooxox
xox oooxxxxoo
ooooxxoxoooo
xoxoooxoxxxx
oooooooooooo
ooooxxooxxxx
xoxoooxoxxxx
xxxxxooooooo
oooooooooooo
ooxooxooxxxo
oooooooooooo
xoxooxooooox
ooxooxooxxxo
oooooooooooo
xoxooxooooox
ooxooxooxxxo
xxooxoooooox
xxooxooooxox
xxooxoooxoox
xoxoooooooox
00X00000 xxxo
XX00X00000X0
xxooxooooxxo
xxooxoooxoxo
xoxoooooooox
xxxxxooooooo
oooooooooooo
oooooooooooo
ooxooxooxxxo
oooooooooooo
xxxxxooooooo
ooxooxoxoxxx
ooxooxoxooox
ooooxxoxoxoo
xoxooxooxoxx
xxxxxooooooo
ooxooxoxoxxx
00X00X0X0000
OXXOOXOXOXXX
XOXOOOOOOOOX
OXXOOXOXOXXX
XOXOOOOXOOXO
OOOOOOOOOOOO
OOOOOOOOOOOX
0000000000X0
OOOOOOOOOOXX
000000000X00
OOOQOOOOOXOX
00000000X0X0
ooooooooxxxx
xxoooooooooo
xxooxooooooo
oooooooooooo
&elt\ I Ik
START.
CHKCL,
ROUND.
IN1.0
PAST,
IN2.9
OUT2.0
OUT1, t
INCHR,
OUT1P1.0
ADMIN.
AD2TEN.
AD If HR,
OUT1P2. A
IN2P1. 8
0UT2P1,0
INCN.
STORN,
ZERO. 0
CLEAR
INPUT 0
TEST ZERO
JUMP CHKCL
INPUT 1
TEST NINE
JUMP ADMIN
CLEAR
OUTPUT 1
OUTPUT 4
OUTPUT 9
INPUT 2
TEST FIVE
JUMP AD2TEN
CLEAR
OUTPUT 2
OUTPUT 6
OUTPUT 10
ADD N
ADD INPUT
STORE INI
ADD ONE
STORE IN2
STORE IN2P1
CLEAR
ADD N
ADD OUTPUT
STORE 0UT1
STORE 0UT1P1
STORE OUT1P2
ADD ONE
STORE OUT2
STORE 0UT2P1
TEST NINE
JUMP PAST
JUMP AD10HR
TEST THREE
JUMP INCHR
TEST TWO
JUMP INCHR
CLEAR
ADD ONE
JUMP INCN
ADD ONE
JUMP INCN
ADD ONE
OUTPUT 1
OUTPUT S
OUTPUT 9
JUMP CHKCL
ADD ONE
OUTPUT 2
OUTPUT 6
OUTPUT 10
JUMP CHKCL
CLEAR
ADD ONE
CLEAR
ADD N
ADD FOUR
TEST FTEEN
JUMP STORN
CLEAR
ADD N
ADD THREE
STORE N
JUMP CHKCL
STORE N
JUMP ROUND
/CLOCK IS 1/0 SLOT #0000000.
/A NEW MINUTE?
/NO. CHECK CLOCK AGAIN.
/YES. READ MINUTE SLOT OF 1ST WATCH.
/IS IT A 9?
/NO. GO TO MINUTE INCREMENTER
/YES. SET EACH
/TEN-MINUTE DIGIT
/TO ZERO.
/CHECK TEN-MINUTE DIGIT.
/NEW HOUR?
/NO, GO TO TEN-MINUTE INCREMENTER.
/YES, SET EACH
/TEN-MINUTE DIGIT
/TO ZERO.
/GET CLOCK-NUMBER COUNTER
/AND FORM INPUT INSTRUCTION
/PUT IT WHERE IT BELONGS.
/FORM OTHER INPUT INSTRUCTION.
/PUT IT WHERE IT BELONGS.
/HERE TOO.
/GET COUNTER AGAIN.
/AND FORM OUTPUT INSTRUCTION.
/PUT IT HERE WHERE IT BELONGS.
/AND HERE.
/HERE TOO.
/FORM OTHER OUTPUT INSTRUCTION.
/PUT IT WHERE IT BELONGS.
/HERE TOO.
/BECOMES "INPUT N"
/IS HOUR DIGIT A 9?
/NO. TEST AGAIN
/YES, GO FLIP 10-HOUR DIGIT
/IS HOUR DIGIT A 3?
/NO. GO INCREMENT HOUR.
/BECOMES "INPUT N+l."
/IS TEN-HOUR COUNTER A TWO?
/NO. INCREMENT HOUR NORMALLY
/YES. IT WAS 23:59, SO SET
/TIME TO 01:00. "OUTPUT N + l" IS HERE.
/SET AC TO 1.
/AND "OUTPUT N" HERE.
/GO INCREMENT CLOCK-NUMBER COUNTER
/ADD 1 TO HOUR
/BECOMES "OUTPUT N".
/CO INCREMENT CLOCK-NUMBER COUNTER
/ADD 1 TO MINUTE DIGIT.
/AND PUT IT
/IN ALL
/THE MINUTE DIGITS.
/THEN GO BACK TO C LOCK-WATCHING .
/ADD 1 TO TEN-MINUTE DIGIT
/AND PUT IT
/IN ALL
/THE TEN-MINUTE DIGITS.
/THEN GO BACK TO CLOCK-WATCHING.
/FIRST CLEAR
/HOUR DIGIT (BECOMES "OUTPUT N”)
/THEN GET TEN-HOUR DIGIT
/AND ADD 1 TO IT.
/BECOMES "OUTPUT N+t".
/ROUTINE TO GET NEXT CLOCK NUMBER .
/ADDING FOUR TO CLOCK NUMBER
/TAKES US TO NEXT CLOCK.
/HAVE WE RUN OUT OF CLOCKS (N-15J?
/NO. GO STORE N AND RETURN
/YES, SET
/N=3
/AND RETURN
/TO START OF PROGRAM
/(WE'VE DONE CHECKING CLOCKS).
/STORE NEW CLOCK-NUMBER COUNTER
/AND SERVICE NEXT CLOCK. END OF MAIN PROGRAM.
/ THESE ARE CONSTANTS.
TWO. 2
THREE. 3
FOUR, 4
FIVE. 5
NINE. 9
FTEEN. 15
INPUT. 6000B
OUTPUT, 6200B
N. f
/RAW INPUT INSTRUCTION. (OCTAL)
/RAW OUTPUT INSTRUCTION. (OCTAL)
/COUNTER FOR WHICH CLOCK WE'RE ON.
IP THI5
TO ©vet
Gal ^
Ten minutes after starting to program in
Machine Language you will probably want Assem¬
bly Language.
It's a pain trying to get ail the ones and
zeroes right. (£m> a, itr
-)•>
It's a pain trying to keep track of binary
numbers for where things are stored.
SO: let's give them alphabetical names.
That’s assembly language. (And the conversion
program we put our alphabetical into, to turn
them back into the binary patterns that rosily
run the machine-- that conversion program is
called the Assembler.)
An assembler is a direct and non-iricky
translator, intended mainly to handle the details
of exact transposition between instruction code¬
words and the exactly corresponding machine-
language program that you intend.
IT WORKS LIKE THIS: The assembler
scans through the assembly-language program,
testing the succeasive alphabetical characters.
After finding the key punctuation marks or
delimiters (shown as comma and slash for the
FIDO assembler), it scans for the alphabetical
lnatruction mnemonics, and translates them by
a table in core memory into the corresponding
binary codes. (It ignores everything on a line
after a slash , which is lucky, since in the
comments you may use words which are the same
as instruction mnemonics.)
The assembler also counts the instructions,
and (starting wherever you say) figures where
In core memory the instructions (and any data
or spaces you put In) go. Then it makes a list
of these addresses, called a symbol table (also
called a name list at less elegant places).
An assembler is the simplest form of
compiler (see p.30). Basically it translates an
assembly-language program, which cannot be run
directly, into a binary program which can.
Then from this symbol table It fill* the
resulting binary addresses into the binary com¬
mands of the program.
Aren't you glad you don't have to?
Generally the assembler then sends out
the binary program to some external device,
auch «s a disk memory or paper tape punch.
Then it can be put Into core memory when you
want to run it.
(You can put a program into core memory
one bit at a time through the front-panel switches;
but nobody likes doing this excopt for teeny pro¬
gram*.)
(Note: an assembler for one computer (say
the PDP-fl) that runs on a different computer
(say. the 360) Is called a croaa assembler.)
\\vti you
p'fl* N'l 4uff.
"Assembly language programming is good for the soul."
5 ^
VRjSrwrot*
There ia a certain folk hero whom the
people all call Bucky. tt ie aaid that he wears
three wriatwatches: one for where he ie now.
one for where he will be next, and one that
teiu what time it ie at hla home.
Well now. Here'e an example of a little
problem on which to try our FIDO computer
Let's wire up a magic wriatwatch for
Bucky the Folk Hero, one that will use a teeny
FIDO on a chip (the coming thing), attached to
three rows of numerical readouts (like those
on pocket calculators).
This application is not so absurd as you
might think.
It la obviously quite simple in principle.
It will let us see some of the ways that
the rock-bottom machine languages of computers
are used.
Ajjwr w
Naturally this got saved for last, and
what ia presented here shows it.
The example was meant to be a case of
not-very-numerical programming that would
ahow the abstractness of it all. The program
Itself has no intrinsic quality related to the
problem; that much should be visible.
Anyhow, I programmed this myself a few
weeks ago in the FIDO language, and was very
pleased with it, but then discovered a couple
of appalling bugs. As time closed in on this
project 1 asked my friend Mike O'Brien to code
the program, and he kindly consented, taking
time out of his previous weekend plans. Here
is Mike's program, for which 1 am grateful.
HowEVer, after it was set in type. Mike
realized that It too has some gross Haws and
would not work as here presented. We thought
of having a chocolate chip cookie contest for
corrections, sending out chocolate chip cookies
to entrants fixing it up, but we don’t have
such • computer and we wouldn't run the pro¬
gram if we had one anyw ay, so see if you can
get the basic'idea of it, and if you arc a real
wise guy fix the program for your own satis¬
faction, and that will be that.
The basic idea is that we have a FIDO,
presumably on a single integrated circuit chip,
attached to thirteen external devices (or periph¬
erals, or input-output devices, or I/O devices
or whatever). These devices are a timer or
clock . which reaches zero once per minute--
thls Is a computer clock, meaning a timer, not
something that people can read-- and the three
rows of numerical readouts that are the desired
Superwalch.
For simplicity's sake we assume here that
each numeral is interfaced to do either input or
output; thus the FIDO computer can ask any
given numeral what it says, and change its con¬
tents .
The finished Wriatwatch ia going to give
time on a twentyfour-hour basis, not twelve, like
st NASA and suchlike places. After 12: S9 comes
13: 00. After 23:59 cornea 01:00.
* t
The bulk of the program is occupied with
tasting the numerals and changing them. How¬
ever. in proportions of activity, the poor thing
ia going to spend moat of ita time saying. "I*
it time yet? Is it time yet? la it time yet?"
(That’s the second, third and fourth inBtruction.)
Because the FIDO selects the particular
input-output device with the last seven bits of
an input or output instruction, this has been
done with "address modification" arithmetic:
creating an output instruction to addreaa a par¬
ticular device by adding the instruction to the
name of the device This ia an ancient 7nS~
honorable programming trick.
In several cases, the program chooses a
device to examine, or fill, by taking • blank
input or output instruction (kept et locations
X OXO XOX and X OXO XXO, respectively) end
in the AC, to a counting number that
ia being used to step around In the array of
numerals. (This counting number is "N."
stored in location X OXO XXX.) (These Instruc¬
tions ware put into the slots in octal form, as
end "62MB" respectively The elashea
are meant to distinguish is roes from Ohs . The
*B" «l the end (in the aseembly Hating) means
that the assembler is supposed to trenalate these
numbers to Binary, taking them three bits at a
time: « M i cornea out to XXO OOO OOO OOO.)
V ft, goe r
Khtl j*y, a
66-66 b;i&
-MVI« IW1I 91*'ft
7 („ e
0 0:0 0 HEXT
Bivxt xwt srvit* *
fi, u io ^
O 0:0 O tfwAe.
*S5 JR? *22
*!(HT5
ts
Note that in thia flowchart
A «r -3
aeans, “stuff the number 3
into the variable A." A
variable is a named location
in core memory.
0 (ITW0> 1
W\RT
TO
Tt ST ;
K^U';
M'TSk
ta:
Anyhow, what the program is really doing,
when it finds the timer has reached zero, is.
testing whether the rightmost digit is s nine.
(It only has to test one, since minutes are the
same round the world.) If it’s not nine, it
just adds one to each-- a part of the program
called ADMIN, starting at XXO OXO. If it's
nine, however, it sets the final digits all to
zero, and then testa the tens digit to see if it's
a five , meaning the end of an hour. (The num¬
ber five hoa been ingenuously stored in a loca¬
tion which Mike has called FIVE, which assem¬
bled to slot number X 0X0 0X0. If you look
there, you will see that the slot does, indeed,
contain the binary pattern for the number 5.)
What a pity there is no time to take you on
a guided tour of this profound, magnificent pro¬
gram. If you dig this sort of thing, however,
you might just be able to dope it out.
kf. At,
H v m
1
: r. .. ti»*
vW-TV ",
L . ..._I s j '■t r> <
U
•» ■// j -I'M
in n* :
Cket IKf.
Uf
*r 14
to. 4 3
ua|e»>
ip
1 MU IfOW.
Mika 0’Brian 'a
alighthj diegruntlad
poataoript to the program.
A UiHD-DP
CR£>SSGOOfct> fUT-tUE
We look at lest at what really happen!
inside a given computer. It muet be a specific
computer became there la no single Inner lan¬
guage tor all computer!. For simplicity's aake
Hike moat Introductory texts) we hereby pre-
aent a fictitious machine.
TflC
* flbo*
(Faithful Jnatrument. Domesticated and Obliging).
The FIDO la a twelve-bit machine. The
main register (it baa only one) ie twelve bile
long, and every memory alot la twelve bita long.
Every inatructlon la twelve bita long;
every data word la twelve bita long, though of
courae much longer plecea of data can be put
together by teking more than one twelve-bit
Some rudimentary inatructione of the FIDO
are Hated In a neerby box. The inatructione of
the FIDO are of two typea; plain ones that Juat
use the main register (like CLEAR), and the
divided ones. which select e memory tlol or
output device. On the FIDO these are divided
Into an operation code ( opcode ) of live bile--
the bite that tell the program follower what the
operation ia to be; and an ad dream of seven
bita, a pacifying which memory alot (or external
device) la to be operated on.
These seven bits allow exactly 128 differ¬
ent patterns, (from OOOOOOO to XXXXXXX).
which means we can select among exactly 128
different memory slots. (See Binary Patterns.
p.>5.)
The Fido cornea with one row of lights
and switches; the row of lights can show tha
contents of any specific working register or
memory slot. When the computer Is stopped,
this la helpful for debugging program* (see p.
3 ».)
Ah, If only we could tell you all about the
FIDO hare! Its many more instructions. The
option bits in the commands that allow fancy
variations, or the option bits in the interfaces,
spoken of earlier, which allow the program to
give different commands to external devices.
But leCa get on with a program for
FIDO. Thrill to the pulsating rhylhma of,
<^0
|ASid c* thc njy> O nfuitg-
f*r t revt.lyt'**' fa Si*
pattern selecting
where to perform
operation)
i&ty
o°*2S>
CLEAR AC
This Instruction c
filled with xeroes.
AC. Result remains in the AC. Wheteve
wss in the memory before la still Ihere.
This instruction Is slso used to bring s
new psttern to the AC, copying It from II
specified memory location; but you have
CLEAR the AC first, so you're sdding it
This instruction copies the cooler
of the AC to the specified memory local
Whatever was In the memory location ia
INPUT*
This Instruction copies the contents
of a specified device register to the AC.
OUTPUT*
This instruction copies the contents
of the AC to a specified device register.
This instruction makes the program
follower take its next Instruction at the
specified address and go on from there.
TEST. SKIP IF EQUAL**
This is a common test instruction,
permitting the program to branch depen¬
ding on various conditions. The contents
of the AC are compared with the specified
core memory location. If they are not the
same, the program continues and tskes the
next instruction in Ihe normal fashion. IF
the two patterns are the same, the pro¬
gram follower SKIPS the next instruction
and goes on lo the one after.
For instance, that middle instruc-
in can be s JUMP instruction, taking
e program to a whole nother part of
re memory and ■ new aeries of events.
■tighU^r ‘"•'ruction, h . v . ,
I lf you want information c
language and asaembly languej
&
iNsmiioKj LWr
An occult aspect of computer design la the
matter of how to pack into the eo-many bits of
sn Instruction word all tha options tha programme
For no particular reason tha instruction
select bita are usually on the left, the address
bits on the right, and option bits (no room for
them In this book, unfortunately) In the middle.
The number of bits in the address deter¬
mine* the number of places in the memory that
the programmer can choose among. 15 bits in
the address means a choice of 12.768 memory lo¬
cations. 7 bits means • choice of only 128.
(See "Binary Patterns." p.33 .)
Generally a specific computer has more tha
one instruction layout.
Deciding whst the instruction layouts ire
to be hinges on the architectural design of the
computer (see p.3i ) and the i net ruction-aet.
It all gate worked out together.
It's ultimately a matter of design elegancs.
but the consequences are very concrete. An
elegant instruction-set Is easy to use and there¬
fore saves a lot of time and money. (Anyone
interested in studying the matter might want to
compare the PDP-11, a 16-bit computer with a
brilliantly designed inatructlon-set. with some
other 16-bit comouter.)
The FIDO is nothing but a stripped-down
version of that beloved family pooch of computerdom,
% PDP-?.
If you buy a PDP-8 from Digital Equipment
Corporation, you get all thla and more. (Except
for the external devicea.) And the PDP-8. of
course, allows much bigger memoriaa than 128
slots, but that’s too complicated for here.) Arf.
are what the computer operates on deep down. "Binary"
Just means that only two symbols are used (Just as
■decimal" men* that ten symbols sre used). Patterns
of binary symbols happen to be electrically convenient,
so that's how computers sre built, but thst would
chsngc If some more convenient act of symbols came
Binary patterns are very systematic and easy
to deal with. Consider the number of binary symbols
you can have in Just four spaces. **LET'S USE THE
LETTERS X AND O, AND PUT THEM IN ALPHABETICAL
ORDER. SO YOU'LL SEE THAT WE RE TALKING ABOUT
PATTERNS . RATHER THAN NUMBERS .
OOOO
O OjO X
O O x|o
o o xjx
0[X O O
O X O X
O X X o
J> X X X
X o o o
X 0 O X
X 0 X o
X O X X
X X o o
X X O X
X X X o
xjx X X
You can »ae that the pattern repasts In certain
inter rating ways. Each column repeats Itself as you
reed down; adding a naw position to tha left doubles
tha number of possible patterns you can have to tha
These are tha Infamous "bits" you have hoard
of. Aa you can see, thara Is nothing hard or compli¬
cated about them Tha number of bita In a thing
are the number of spaces which can be either X or
Now, tha most basic fact about any computer
la its wor* length : that la. tha number of apace*
to a standard memory slot of that computer.
A *U-Wt computer' uixa (ha PDP-I) has memory
weeds that are all twelve bite long A "18-bit
ooavMJtar’ (ilka the PDP-11) has memory words that
are all 18 bite long .
Actually computers with small word lengths
like these ore called minicomputers. Big computers
have much bigger word lengths. The IBM 360
has a 32-bil word length. The Control Data 6600
has a 60-bit word.
Now. It is an interesting fact lhat not only
are computer memories divided up into slots, or
locations, of equal length.
but each of Ihcae location* ha* an address, that
la, a number by which the contenls of Ihe location
can be found. And these numbers are binary.
Many forma of Information are kept in binary
patterns which era not numbers. For inslanca.
letters of the alphabet ore usually stored aa 8-
blt patterns.
However, we will have to stop using these
X'a and O'*. It's not really done . *0 we will
switch to the more usual way oT writing binary
patterns with l's and zeroes. (Apologies to readers
who hste numbers; but remember that these patterns,
while we may write them out as l's and zeroes,
may represent wholly non-numerlcal kinds of
information J ~That means tha letter Q ia
but lt'a still tha letter Q.
Of course, bits may also represent numerical
information. And so we peas on to
This brings up some interesting facts.
CERTAIN NUMBERS ARE SPECIAL because
they are the number of things lhat can be specified
by a certain number of bits.
Special number
128 seven bits .
256 eight bits
512 nine bit*
1026 ten bits
("ONE K" Is 1024; memories and everything
else come in K'a, or multiples of 1024.)
Actually tha term “k," standing for "kilo-," should
mean one thousand. and the term BK. or Binary K.
la used by fussy people to stand for tha vary important
nesrby number 1024. But computer people generally
use expressions ending In K for Ihe following special
numbers:
THAT'S HOW MANY
NUMBER combinations fit in
2048 ("2K") eleven bits
4096 ("4K") twelve bita
8192 ("8K") thirteen bite
16.384 ("16K") fourteen bita
33.768 ("32K") fifteen bits.
BINARY NUMBERS.
These are the same old binary patterns,
but when we decide to treat them a* numbers,
they are binary numbers.
Let's count. Note that these are tha asmr
combinations of bite as before, merely put In the
more usual notation
Above this number they Increase very fast, and
we generally have to lock them up. but the idea ia
this; tha number of bite used to select something
He.Ha toe number of things you can select among .
For Instance. 1/you heve a computer memory with
32K different locations. you need fifteen bita exactly
to specify a location to memory.
Here are some ramifications:
Aa you observe, the higher numu... need more
and more bits to hold them
• The word length of a computer determines
how large a number 11 can hold. A computer with
a twelve-bit word can only hold a number up to
4083 In one memory location (since we use 000 000
000 000, Ihe first comb torn lion, to stand for zero);
if wo went to use longer numbers we heva to aet
aside two or more word locations per number. (A
16-blt computer can hold a number up to 83. WS to
one memory location.)
. i„ designing date structures. If you use
binary codes (rather than. say. alphabetical characters),
you heva to allow enough bits for ell the alternatives
that might turn up
• In the design o
(or e colnputer, therefoi
aside to specify an eddi
that instruction can salt
tha wired-to Instructions
a. 1h# number of bits sat
isa In core determines whother
;l (rum Ihe whole memory.
or Just a perl of it.
32
Every computer le wired to accept • spe¬
cific system of commends. When Iheee commend*
■ re atored tn the computer's memory, end the
computer'? program follower fete to them, they
cause it to respond directly by electronic re fie*.
This is celled machine language, the very lan¬
guage of the machine Itself
In moat available computers the machine
languages are binary, meaning composed of only
two alternative symbols. Binary because It’e s
sensible way of organizing the machine's struc¬
ture; It permits programs to be reduced to s
single common form of information , snd permits
programs to be stored in binary memory. Each
individual instruction or command ordinarily
occupies one memory slot, though some compu¬
ters have commands of varying length.
Different computers have different machine
languages, but the Instructions of all computers
are basically similar. Big computers have mors
commands, with more variations, and carry
them out faster; but those variations are just
artra ways of saving steps, not qualitatively
different features.
These deep-down operations ARE ALL THE
THINGS THE COMPUTER EVER DOES. However,
in their combinations theae Instructions can be
woven into chains and diadem* of complex action*.
ALL COMPUTER PROGRAMS ARE EVEN¬
TUALLY WRITTEN OR ENACTED IN THE MACHINE'S
PARTICULAR BINARY LANGUAGE.
Now. it is entirely possible to write your
programs st this level, considering slid arran¬
ging rock-bottom commands. This is called
machine-language programming (and assembly
programming; see examples a little later on).
Indeed, working at this level is very highly
respected in some quarters. Others avoid It,
This Is a very serious matter of taste snd what
you're working on.
Higher-level languages, seen on earlier
pages, have more convenient forms for people,
but must be translated, either ahead of time or
on a running basis, to the bottom-most codes
that make things happen ih the machine. All of
them are built out of machine language. Writ¬
ing the language processors, programs that
enact or translate these higher-level languages,
is considered a black art. (See p.J#.)
Every programmable device ha# a "machine
language," or rock bottom code system that acti¬
vates the thing directly; its program follower
responds electrically to these codes, and enacts
them one instruction st a time.
True computers are programmable devices
that can modify their own lnatructions. change
their sequence of operation* and do other versa¬
tile stuff.
1V« W* Wb
I XOOA»)twostkwX^
Laearwj T) []
3
Computers are basically alika. Ignore their
appearances; a roomful of roaring cabinets may
have a great dtal In common with a small blinking
bo*; Indeed, they may have the same architecture,
or structure, and therefore be the same computer.
The structure of computers. In their glorious
similarities and fascinating differences, ia called
computer architecture .
(For the architecture of a beginner's com¬
puter, see p.5>; for the architecture of some
famous computers, see^p.N 4 "'} ■)
Computer architecture covers three main
things; registers (places where something happens
to Information); memories (places where nothing
happens to information): their Interconnections;
and machine language, all the bottom-level inatruc-
tiona (for this last aee "Rock Bottom," p. 52,)
REGISTERS AND MEMORIES
Computers are made, basically, of two
things; registers and memories . A register is
where something happens to information; a memory
ia where nothing happens to information. Let's
go over that slowly.
A register is a place where something
happen# to information; the information can be
flipped around, tested, changed by arithmetic,
or whatever. (We noted earlier that registers
are what connect a computer to its accessories.
They are also principal parts of the computer
itself.)
A memory is a place where nothing hap¬
pens to Information. A program puts the infor¬
mation there, and there it stays till some pro¬
gram pulls it out again or replaces it.
A main or general register (often called
the accumulator . for no good reason) is where
the program brings things to be worked on,
tested, compared, added to and so on. There
ear be several of them in a computer.
Other registers perform other functions in
the computer; a given computer's design, or srchi -
techture , is largely the arrangement of registers
and the operations that take place between them.
The reason we don’t Just have all registers —
and no memories at all-- is that registers tradi¬
tionally cost more than memories. (However, some
machines are being tried that have ell working
registers instead of memory . See STARAN, p. 43 . >
Memories come in all sizes and speeds.
So lota of computers have big slow memories,
such as disk memories, along with their small
faat memories.
A memory consists of numerous holding
places or storage locations , each holding one
standerd piece of information for the computer,
a word having a specific number of bits (see p.
.) We must stress; a "COMPUTER WORD"
HAS NOTHING TO DO WITH ENGLISH WORDS OR
ALPHABETICAL CHARACTERS. The term refers
to a specific machine's standard memory slot,
having a fixed number of bit positions.
One important reason for this standardiza¬
tion is that each holding place, or memory loca¬
tion, can be given a number or address . If
every slot in the memory ha* an address, infor¬
mation can be stored in specific places:
snd gotten beck out of specific places;
It
A core memory haa a definite rhythm or
cycle , into which it divides the passing time.
The memory cycle of a core memory ia so Im¬
portant that its duration is often called the
cycle time of the confter. A request to the core
memory made at the beginning of the cycle
ia honored et the end of the cycle. Core cycles
are very fast, being these days about one
microsecond, or millionth of a second.
A core memory can only perform one eel
(store or fetch) during one memory cycle.
Core cycles during which nothing la
requested of the memory simply go by.
One lest point about core memories. The
number which specifies an address to the mem¬
ory is a binary pattern-- Just like all the other
information (see "Binary Patterns," p. "S'i ).
(Or more exactly, whatever binary pattern is sup¬
plied to the memory as the address to store or
from which to fetch, that pattern will be treated
as the address to store or from which to fetch,
that pattern will be treated aa a binary number
whether it was supposed to be or not. It could
be the alphabetic word GR1NCH which got there
by mistake (see "Debugging," p. JJ® ), but the
memory will treat it as an address number and go
to the address specified by that pattern.
THEN WHAT ARE THE DIFFERENCES
BETWEEN COMPUTERS?
The word length
(number of bit-spaces in a main
register and memory alot)
The number of main registers
and what they can do: i.e., how
they are set up and what operations
can take place in and among them:
l.e.,
the Instruction Set (see nearby);
The amount of memory;
The accessories or peripherals;
The cycle time.
Here’s the computer, then, in sll its glory;
s device with a symbolic program, stored in a
memory, being stepped through by s program
follower.
The commands of the program cause the
program follower to carry out the individual
steps requested by each command of the program.
THE ROCK BOTTOM PROGRAM FOLLOWER
How, you aak desperately , does thl# inner¬
most program follower work? The one that Is
built into the computer?
Aha.
Basically ft consists of two specific regis¬
ters. the Program Counter (usually abbreviated
PC) and the Instruction Register (usually abbre¬
viated IR), and other electronic stuff, loosely
termed "decoding logic."
(Since we are already visualizing the
program follower ea a little hind , let'a think of
the Index finger as the program counter and
imagine that the thumb can flip an instruction
into a little cup. the Instruction Register or IR.
What the heck.)
WHEN ■ program la set Into operation, the
binary pattern specifying ita first address in
memory is put Into the program counter.
Then the Instruction at that address la
fetched to the program follower (that ia, put in
the Instruction register), decoded and carried
THEN THE PROGRAM COUNTER AUTOMAT¬
ICALLY HAS ONE ADDED TO IT, SO IT POINTS
TO THE NEXT INSTRUCTION
The instruction pulled from memory ia
held In the command or instruction register
and there decoded by the syatem'a electronics.
it la of no concern to the programmer how
this is done electronically. (And indeed elec^
Ironies is generally of little concern to computer
people, unless they are trying to design or op¬
timize computers or other devices themselves.
Indeed, the electronic techniques are constantly
changing.)
All we need to know ia that an electrical
decoding system (called the logic circuits) carries
out the specific instruction-- for instance, by
shutting off the path to the memory, turning on
the adding circuit, and opening patha through
the adding circuit and back to the main register.
Now that the program counter holds ths
number of the next instruction it In turn Is
accordingly fetched and executed.
And so it continues.
When an instruction calls for a Jump or
branch in the program, what happens?
The Jump command causes a new number
to be stuffed into the program counter, that's
what, and so that's where the program goes next.
ALTERNATING CYCLES
Many instructions tell the program follower
to take a data word (also a binary pattern) from
memory and put it in a main register or vice
Such an Instruction is translated by the
decoding logic into a request to the memory.
Since a core memory can only do one
thing during one of ita cycles, the next instruc¬
tion in the program cannot be fetched until the
data haa moved to or from the memory.
Thus in many typea of program the cycles
alternate:
Instruction cycle (fetch ths next)
Data cycle
(data goes to or from memory).
Instruction cycle,
Data cycle,
and so on.
'©f£WoklS
op cpiMrwe?
v To O*jF0i£.
YOUR BASIC COMMANDS. NOW
(Computsrs exist which do little more than these,
snd yet they can in principle do anything
fancier computers can do.)
TO BE SHOWN: The following are the rock-bottom
basic operations of computer!, available aa
specific Instructions in all computers (with
some variation).
The Bret seven listed below will be
used in the extended example In the next
spread.
LOAD s binary pattern from core memory to •
main register
STORE a binary pattern In core memory from a
main register.
SEND OUT ("OUTPUT") a binary pattern to an
external devloe.
BRING tN r INPUT") a binary pattern from an
external device.
ADD TWO binary patterns together. (This
causes them to be treated as numbers,
whsthar they were to begin with or not.)
JUMP—
Oo to another perl of the progrmn *
end forget you were here.
TUT TWO binary pattern! against esch other.
«id branch or not in the program depen¬
ding on the result
NOT TO BE SHOWN: Here are the rest of the
utterly fundamental commands of computsrs.
(These are not used In the forthcoming
example.)
TEST ONE SPECIFIC binary pattern, and branch
In the program depending on the result.
SET AN ACCESSORY IN OPE RATION/TURN IT OFF.
REVERSE (or "COMPLEMENT") a binary pattern -
changing all the X’e to O'e and vice versa.
SLIDE (or "SHIFT") a binary pattern sidelong
through s register.
FLIPPER (or "LOGICAL") operations between two
binary patterns, especially —
OR (or "INCLUSIVE OR" or "IOR")--
result is an X where either
original pattern was an X.
AND (or "MASK")-- result is an X
only where both origins! pat¬
tern* had an X.
FANCY OPERATIONS
Ths following operations are dssirable but not
strictly necessary. and many oomputers, es¬
pecially minicomputers, don’t have thsm all.
SUBTRACT (Can also be done If necessary
with combination of edds snd flips.)
MULTIPLY. (Can also be done if necessary
with combination of adds, shifts and teats.)
DIVIDE. (Can also be done if necessary with
combination of subtracts, shifts and (sata.)
MORE FLIPPER ("LOGICAL") operations:
XOR (or "EXCLUSIVE OR")-- result
ia an X only whare one pattern
had an X, bul not both.
NAND- ravened AND.
NOR - reversed OR
SUBROUTINE JUMP—
"Go to another part of the program
but remcmember this place beceuse you'll
be coming back on your own."
RETURN PROM SUBROUTINE--
"Go back to wherever it ws* in the
program that you last came from.”
PUSH (on Stack machines only, see p. ) —
take a binary pattern and put it on lop
of the Stack.
POP (on Stock machines only, see p. )—
take whatever binary pattern la now on
ths top of the Stack.
ADD ONE (or "INCREMENT")-- (Useful whan
you're counting the number of times some¬
thing ha* been done.)
SUBTRACT ONE (or "DECREMENT." not "excre¬
ment")-- (Also useful when you’re count¬
ing the number of times something haa beet
done.)
ASTRONOMICAL/INFINITESIMAL ARITHMETIC (or
"FLOATING POINT” arithmetic)-- opereta*
on a certain number of Significant Digits
and keep* separate track of the decimal
point-- actually a Binary Point, since it's
rarely If ever done decimally.
“►Vary important In the physical
ecicnce*.
Almost any operation* can be " built in"." The
sky Is of course the limit, since any aleo-
tronlc operation can be added to a compu¬
ter's 1 net ruction-set if daelrad sey. "turn
on the electric blender" or "multiply quat¬
ernion*"-- but ths former 1* more easily
done aa an output instruction, and tha
latter as part of a program
Somehow
LOADING. STORING,
MODIFYING
AND TESTING
BINARY PATTERNS
DOESN'T SEEM
TERRIBLY FRAUGHT
WITH POSSIBILITIES;
but the endless variation* and ramification*
make cheas look like tic-tae-toe.
And part of the power, of course, is In 1
the great speed, the teeny fraction of a second \
each step takes; five hundred operations yet
take only sbout a thousandth of a second. So
no matter how intricate the enactment to which
these tiny step# are built, it still happen*
awfully fast.
A computer, then, internally Just consist*
of certain places to work on information (main
registers), certain places to keep it the reet of
the lime (memories). certain pathways snd Inter¬
connections between there, an instruction-set
having certain power* whose lnatructions can ba
operated on out of memory, and a program fol¬
lower thel carries out tha instructions of that
Instruction -set
INSTRUCTION-BBT.
The system of command patterns
designed and wired into e particular computer,
each with its exact results
(The instruct lone in the set are the vocabulary
of a machine language .)
J
1 ijeGeev , _
(Ajmpuw? L<W<5W<3CJ
A certain number of computer language*
are very widely accepted and uaed; 1 list them
here. If you want to learn any of them, I believe
that Daniel McCracken has written a manual on
every one of them. (Not the variants listed,
though.)
Why their names are always spelled with
capital letters 1 don’t know. (Generally they
get let down in longer articles, though.)
MOM
TO|W\)
FORTRAN waa created In the late fifties,
largely by John BackuB, ae an algebraic pro¬
gramming system for the old IBM 704. (However,
the usual story is that it stands for FORmula
TRANslator.)
Fortran is "algebraic," that is, it uses
an algebraic sort of notation and was mostly
suited, in the beginning, to writing programs
that carried out the sorts of formulas that you
use in highschool algebra. It's strong on num¬
bers carried to a lot of decimal places ("scientific"
numbers) and the handling of arrays, which la
something else mathematicians and engineers do
a lot (see Arrays under BASIC).
Fortran has grown and grown, however;
after Fortran 1 came Fortran H. Fortran III and
Fortran IV; as well as a lot of variants like
Fortran Pi ("Irrational, and somewhere between
IU and IV"), WATFOR and WATF1V.
The larger Fortrans-- that is, language
processors that run on the bigger computers--
now have many operation a not contemplated in
the original Fortran, Including operations for
handling text and so on.
BASIC, presented earlier, is in some res¬
pects a simplified version of Fortran.
This program uas a surprise from
Alan Sslles t a student at Chicago
Cirals. Re was amused by my prac¬
tice of alphabetising phone mer-
bere, and wrote a progrm to do it
automatically.
Promisee of the program: you sup¬
ply it with your phone number, and
it prints out all the alphabetical
combinations that could also be
dialled to reach your telephone.
FotThh.
dlfO *U#MOO*»»
16*0121 9 *0122 0 - 61*1
COOf OfOillfcfWfNTl 'Oft '♦€>**
Vftlimfl 204 MOW Aft 99*
(MO O' COftMLATlnft
\IMLIPST
W n/j
ALGOL is considered by many to be
one of the best "scientific” languages; it has
been widely accepted in Europe, and is the
standard "publication language" in which procedures
for doing things are published in this country.
It Is different from FORTRAN in many ways,
but a key respect la this: while in FORTRAN
the programmer must lay out at the beginning
of hia program exactly what spaces of core
memory are to have what names, in ALGOL
the spaces in core memory are not given names
except within subsections of the program,
or "procedures." When the program follower
gets to a specific procedure, then the language
processor names the spaces in core memory.
This has several advantages. One is
that it can be uaed for so-called "recursive”
programs, or programs that call new versions
of themselves into operation. 1 guess we better
not get into that. But mathematicians like
it.
Originally this language was called 1AL,
for International Algebraic Language, but then
as it grew and got polished by various inter¬
national committees it was given its new name.
0 don't know if anyone consciously named
It after Algol, the star.)
It has gone through several versions.
Algol 62, the publication language, is one
thing; Algol 70, the 1870 version, la much
more complicated and strange.
Several versions of ALGOL have gotten
popular in this country. One. developed at
the University of Michigan, la called MAD
(Michigan Algorithm Decoder); Us symbol la
of course Alfred E. Newman . Another favorite
(for its name, anyway) la JOVIAL (Julea' Own
Version of the International Algebraic Language),
developed under Jules Schwartz (and supposedly
named without hia consultation) at System Devel¬
opment Corporation.
When IBM announced Us System 360 back
in 1864, there had been hope that they would
support the international language committees
and make Algol the baaic language of their new
computer line. No auch luck. Instead they
announced PL/1 (Programming Language I), a
computer language that waa going to be all
thing* to all men.
In programming style it resembled COBOL,
but had facilities for varieties of "scientific"
number* and aom* good data structure system*.
It 1* available for the 360 and for certain big
Honeywell computer*; Indeed, the operating sys-
tem for MULTICS (see p. fS ) waa written in
PL/1. Whether there are people who love the
language I don't know; there are certainly
people who hate It.
Below: Relies’ program to calculate the date of Easter.
The language is Algol.
Yecdtn, it's
Csrou
Research and hobby types hate COBOL or
ignore it, but it's the mein business programming
language. Your income tax, your checking ac¬
count, your automobile license— all are presum¬
ably handled by programs in the COBOL language.
COBOL, or COmmon Business Oriented Lan¬
guage, was more or leas demanded by the Depart¬
ment of Defense, and brought Into being by a
committee called CODASYL. which is apparently
still going. COBOL uses mostly decimal numbers,
la designed basically for batch processing (des¬
cribed elsewhere), and uses verbose and plonking
command formats.
Just because it's standard for business
programming doesn't mean it's the best or moat
efficient language for business programming;
I’ve talked to people who advocate business pro¬
gramming in FORTRAN, BASIC, TRAC and even
APL. But then you get into those endless argu¬
ments ... and it turns out that a large proportion
of business programmers only know Cobol, which
pragmatically settles the argument.
There are people who say they've discovered
hidden beauties in COBOL; for instance, that ft's
a splendid language for complex pointer manipulation
(see Data Structures, p. ). That's what makes
horse racing.
iA* 4 ^ as// -f J^essicsUt^
Sotkt e*il ,J
"After you etudy it for six months, it mkee
perfect sense." —An IBM enthusiast.
JCL is a language with which you submit programs
to an IBM 360 or 370 computer. "Submit" is right. Its
complications, which many call unnecessary, sysfcolis*
the career of submission to IBM upon which the 360
progra^er embarks. (Sea IBM, pp. 52-3, end 360, p. 41.)
SNOBOL is the favorite computing language
of a lot of my friends. It is a list-processing
language, meaning it's good for amorphous data.
Gt derives from several previous list-processing
languages, especially IPL-V and COMIT.^
SNOBOL Is a big language, and only runs
on big computers. The main concept of it ia
the "pattern match," whereby a string of symbols
la examined to see if It has certain characteristics,
including any particular contents, relations between
contents, or other variations the programmer can
specify; and the string substitution, where some
specified string of symbols is replaced by another
that the programmer contrives.
IiJf
ia probably the favorite language of the artificial-
intelligence freaks (see A fondness* for
LISP, incidentally, is not considered to reflect
on your masculinity.
LISP is a "cult" language, and its adherents
are sometimes called Llspiana. They see computer
activities in a somewhat different light, as com¬
posed of ever-changing chains of things called
"cars” and "cudders," which will not be explained
here.
LISP waa developed by John McCarthy at
MIT, based largely on the Lambda-notation of
Alonzo Church. It allows the chaining of oper¬
ations and data in deeply intermingled forma.
While it runs on elegant principles, moat people
object to its innumerable parentheses (a feature
shared to some extent by TRAC Language).
Joseph Weizenbaum, also of MIT, has
created a language called SLIP, somewhat resem¬
bling LISP, which runs in FORTRAN. That means
you can run LISP-like programs without hsvlng
access to a LISP processor, which is helpful.
THtN, IWi
If you feel like making program* run fast ,
and not take up very much core memory, you go
to machine language, the computer’s very
wired-up deep-down system of commands (aee
p. t3£). It takes longer, usually, but many peo¬
ple consider it very satisfying.
Then, of course. If you h*ve a particular
atyle and approach and *et of lntereata, you
will probably start building up a collection of
Individual programs for your own purposes
Then you'll work out simplified ways of
calling these Into operation end tying their
reaulta and data together.
Which mean# you'll have a language of your
own.
30
MGit tAMfXHGES
A computer language i» a system for casting spells.
This la not a metaphor but an exactly true statement. Each
language haa a vocabulary of commands . that is. different
orders you can give that are fundamental to the language,
f«it a syntax , that ia . rules about how to give the commands
right, and how you may fit them together and entwine them.
Learning to work with one language doesn't mean
you’ve learned another. You learn them one at a time,
but after some experience it gets easier.
There are computer languages for testing rocketshlps
and controlling oit refineries and making pictures. There
are computer languages for sociological statistics and designing
automobiles. And there are computer languages which
will do any of these things, and more, but with more difficulty
because they have no purpose built in. (But each of these
general-purpose languages tends to have its own outlook.)
Most programmers have a favorite language or two,
and this is not a rational matter. There are many different
computer languages-- m fact thousands— but what they
all have in common is acting on series of Instructions .
Beyond that, every language is different. So for each language,
the questions are
WHAT ARE THE INSTRUCTIONS?
and
HOW DO THEY FIT TOGETHER?
Most computer languages involve somehow typing
in the commands of your apell to a computer set up for that
language. (The computer is set up by putting in a bigger
program, called the processor for that language.)
L jjhnb- «■ r ic *** *****
>» </? cane muneryj
Then, after various steps, you get to try your program.
I
carries out each Instruction
as It's encountered.
ir A C QWiUEt#
chews the instructions
of the language
into another form
to be processed later.
lh|0*X?
Basically there are two different methods.
A compiling language , auch as FORTRAN or COBOL.
has a compiler program, which sits in the computer, and
receives the input program, or "source program." the way
the assembler does. It analyzes the eource program and
aubstitutes for it an object program, in machine language,
which ia a translation of the source program, and can actually
be run on the computer. The relation of the higher language
ia not one-to-one to machine language: many instructions
in machine language arc ofien needed to compile a single
instruction of the source program. (A source program of
100 lines can easily come out a thousand lines long in Its
output version.) Moreover, because of the interdependency
of the instructions in the source program, the compiler
usually has to check various arrangements all over the
program before it can generate the final code.
Most compilers come in several stages. You have
to put the first stage of the compiler into the computer,
then run in the source program, and the first stage puts
out a first intermediate version of the program. Then you
put this version into a second stage, which puts out a second
intermediate version; and so on through various stages.
This is done fairly automatically on big computers, but
on little machines it's a pain.
(In fact, compilers tend to be very slow programs ;
but thBt depends on the amount of "optimizing" they do.
that is. how efficient they try to make the object program.)
An interpretive language works differently, There
sits in core a processor for the language called an interpreter ;
this goes through the program one step at a time. actually
carrying out each operation in the list and going on to the
next. TRAC and APL are interpretive; it's a good way
to do quickie languages.
Interpreters are perhaps the easier method of the
two to grasp, since they seem to correspond a little better
to the way many people think of computers. That doesn't
mean they're better. For programs that have to be run
over and over, compiling is usually more economical in
the long run; but for programs that have to be repeatedly
changed , interpreters are often simpler to work with.
A BLACK ART
Making language processors, especially compilers.
Is widely regarded as a black art. Some people have tricks
that are virtual trademarks (see below) .
Once you know a language you can cast spells in
it; but that doesn't mean it's easy. A spell cast in a computer
language will make the computer do what you want—
1F it's possible to do it
with that computer;
IF it's possible to do it
in that language;
IF you used the vocabulary
and rules of the language
correctly;
and IF you laid out in the spell
a plan that would effectively
do what you had in mind.
BUT if you make a mistake in casting your spell. that is
a BUG. (As you see from the IF* aLove, many types of
bug are possible.) Program bugs can cause unfortunate
results. (Supposedly a big NASA rocket failed in takeoff
once because of a misplaced dollar sign in a program.)
Getting the bugs out of a program is czlled debugging.
It's very hard.
4k rifar
h st\s (A
Actually, the design of a language-- especially the
syntax . how its commands fit together-- strongly influences
the design of its processor. BASIC and APL. for instance,
work left-to-right on each line, and top-to-bottom on a
program. Both act on something stored in a work area.
TRAC, on the other hand, works left-to-right on a text
string that changes size like a rubber band. Other languages
exhibit comparable differences.
MIXED CASES AND VARIATIONS (for the whimsical)
There are a lot of mixed cases. A load-and-go compiler
(such as WATFOR) is put into the computer with the program,
compiles it. and then starts it going immediately. An interpretive
compiler looks up what to do with a given instruction by in¬
terpreting it into a series of steps, but compiling them instead
of carrying them out. (A firm called Digitek is well known
for making very good compilers of this type.) An Incremental
compiler just runs along compiling a command at a time;
this can be a lot faster but has drawbacks.
BIBLIOGRAPHY.
DESIGNING COMPUTER LANGUAGES
Every programmer who's designed a language, and
created a processor for it. had certain typical uses in mind.
If you want to create your own language, you figure out
what sorta of operations you would like to have be basic
in it, and how you would like it all to fit together so as
to allow the variations you have in mind. Then you program
your processor (which is usually very hard).
David Gries, Compiler Con struct ion for Digital Computers .
Not for beginners, but a beautiful book. Good on
abstract theory of languages, too.
A program ia like a nose;
Sometimes It runs, sometimes it blows.
Attributed to Howard Roae.
( Datamation . 1 Sep 71. 33.)
According to the grapevine.. .
a prestigious Southern university
had a program
where the number of months
was carelessly set to 10
(aa a dimension In an array).
In November,
nobody got their checks
till this error was found.
candid photos
J£50<26fk|<r
Debugging means changing and fixing your program till it works the way you
want it to.
This ie the part of programing people like the leaet.
You run your program and then try to find out what vent wrong. It could be
a mietake in the baeio thinking ("logic error"), or a clerical error in the
particular choice of ao/mands to carry out a well-thought »ou t prooeee
("ooding error”).
Some eyeteme allow you to debug interactively, from a terminal. This helps
a lot. You can run parts of your progran, get it to stop at certain points
to let you look around, and so on.
No program is ever fully debugged.
For every bug that goes out.
two more bugs go tn.
-- folk saying
- - folk saying
23
Tilt OFMT^
How does a computer program
print something out on a printing
machine? It sends the code for each
letter out to the printing machine.
How does a computer program
respond to something a user types in?
It compares the codes that come in
from the letters he types with a
series of codes in memory, and when
it finds a match between letters,
numbers, words or phrases, bran¬
ches to the corresponding action.
How doea a computer program
measure something? It takes in
numerical codes from a device which
has already made the measurements
and converted them to codes.
IF Vt)0 WAMT
WE GOT 'e^
The baalc klnda of number operations
wired into all computers are few: Just add
(and sometimes subtract) binary numbers.
However, up above the minicomputer range,
a computer may have multiply, divide, and
more. Fancier computers ofTer more types
and operations on them.
PLAIN BINARY— Very important for coun¬
ting. Represents numbers aa
patterns of l's and O'a (or X's
and Ohs, if you prefer). How
to handle negative numbers?
Two ways:
TRUE NEGATIVE-- binary number
with a sign bit at the begin-
k ning, followed by the number.
Some TV writer’s
idea of a computer
announces this when
data are insufficient or
contradictory. Ho hum.
Od$|€J>--|>OWM fATh,'-
AN i!*A wHVe TtMe
HAS fAKC>
Codes are patterns or symbols which
are assigned meanings. Sometimes we
make up special codes to cut down the a-
mount of information that has to be stored.
On your driver’s license, for instance,
they may reduce your hair color to one
decimal digi, (four bits of information),
since there are less than nine possibilities
for quick identification of hair-color anyway.
Obviouily. codes can be any dam
thing: any set of symbols that is less than
what you started with. But by compressing
information they lose information, so that
subtleties disappear (consider the use of
Letters A to F to grade students). When
you divide a continuum into categories, not
just the fewness of the categories, but the
places you draw the line— called ’’breaks"
or "cutting-points’'— present problems. Such
chopping frequently blurs out important dis¬
tinctions. Coding is always arbitrary, fre¬
quently destructive and stupid.
Lota of ways now exist to handle writ¬
ten information by computer. These often
present better ways to operate than by using
codes of this type. But many computer pro¬
grammers prefer to make you use codes.
(NOTE: there are two other senses of
"code" used hereabouts: 1) the binary pat¬
terns made to stand for any information.
especially on input and output; 2) what
computer programs consist of, that is, lines
of commands.)
<yoMt PoiK\JS
, Trouble is, the arithmetic is
£ harder to wire for this kind,
‘ because there are two zeroes
(plus and minus) between 1
and -i.
ADDABLE NEGATIVE— this system
does a sort of flip and begins
a negative number with all
ones. It means that the ma¬
chine doesn't have to have sub¬
traction circuitry: you Just add
the flipped negative version of
a number, and that actually
subtracts it. This has now
caught on generally. (It’s
usually called "twos complement
negative," which has some ob¬
scure mathematical meaning.)
BCD (Binary-Coded Decimal)— the accoun¬
tant's numbering system. Used by
COBOL (see p. Z/\ ). It’s plain old
decimal, with every numeral stored
In four bits: the machine or language
has to add them one numeral at a
time, instead of crunching together
full binary words.
FLOATING POINT-- the scientist’s number
technique for anything that may not
come out even. Expresses any
quantity as an amount and a size.
, >'it . aw 4
4«iVk*J pf'-'t) ^
The "amount" part contains the ac¬
tual binary numerals, the "size" is
the number of places in front of or
after the decimal point that the num¬
ber starts. Very important for as¬
tronomical and infinitesimal matters,
since a floating-point number can be
bigger, say, than
For some people even this isn’t pre¬
cise enough, so they program up
"Infinite precision arithmetic,” which
carries out arithmetic to as many
places as they want. It takes much
longer, though.
For historical reasons computers have
been used mostly with numbers up to now
but that is going to be thoroughly turned ’
•round. Within a few years there ^ b,
more text- written prose and poetry--
stored on computers than numbers.
Control, reC * nt mM8iv * la*»auit by
k V* na ‘ [BM ' U was sealed
that IBM had an awesome number of letters
and communications stored on magnetic
memory. J
When I Lived in New York, I had a
driver’s license with the staggering serial
number
NO 5443 12903 3-4121-37
Now it may very well be, as in some
serial numbers, that information Is hidden
in the number that Insiders can dope out,
like my criminal record or automobile acci¬
dents , if any. (N is my initial, and two
of the digits show my date of birth, a handy
check against alteration by thirsty minors.
But the rest of it is ridiculous.) The fact
that that leaves 15 more decimal digits means
(if no other codes are hidden) that New York
State has provision in their license numbering
for up to 999,999,999.999.999 inhabitants.
It is doubtful that there will ever be that
many New Yorkers, or indeed that many
human beings while the species endures.
In other words, either New York
State is planning on having many, many
more occupants, or an awfully inefficient
code has been adopted, meaning a lot of
memory space is wasted holding those
silly big numbers for milliona of drivers.
However, that doesn't represent s lot of
money. 10 million decimal spaces these
days fits on a couple of disk drives. But
it’s an awful pain in the neck when you
want to cash a check.
m WTfUT
Data has to get inside the machine
somehow, and results have to get back out.
Two main types of codes— that is, stan¬
dardized patterns— exist, although what
forma of data programs work mi inside
varies considerably. (The input data can
be completely transformed before internal
work starts.)
1. ASCII (pronounced "Askey."
American Standard Code for Information
Exchange. This allows all the kinds of
numbers and alphabets you could possibly
want (for instance, Swahili) for getting
information in and out of computers.
ASCII is used to and from moat
Teletype terminals and key scopes.
"Logical deduction" really consists of tech¬
niques for finding out what’s already
in a data structure.
"Logical inconsistency" means a data
structure contradicts itself. Rarely
does it happen that a computer helps
you discover something new about a
subject that you didn’t suspect or see
coming without the computer; after
all. you have to set up a study in
such a way aa to make room to find
things out, and you can only make
room to find some things out.
Til* PUNCH Cftft) HOjTH'T'f
Punch cards are not Intrinsically evil.
They have served many useful purposes.
But the punch-card mentality is still around.
This will be seen in the programmer who
habitually sets things up so we have to use
punch cards (when other media, or inter¬
active terminals, would be better); who in¬
sists an the user or victim putting down
numbers (when with ■ little more effort the
program could handle text, which is easier
for the human , or even look up the infor¬
mation in data it has already); who Insists
that people's last names be cut down to
eleven letters because he doesn't feel like
leaving a longer field or handling exceptions
in his program; who insists on the outsider
cutting his information into snarfy little codes,
when euch digestion, if needed at all, could
be batter done by the program; and so on.
The punch card mentality is responsible
the woes that have been blamed
WHAT’S AVAILABLE IN
MACHINES AND LANGUAGES
Some machines, like the 360, are
more-or-less wired up to handle several
number types: binary, floating point, BCD.
Little machines usually only have plain bin¬
ary. so other types have to be handled by
programs built up from that fundamental
binary.
Languages make up for this by
providing programs to handle numbers in
some or all of these formats. There ere
languages that offer even more kinds of
numbers--
IMAGINARY numbers
(two-pert numbers
following certain rules)
QUATERNIONS
(like Imaginary numbers
but worse)
and goodness knows what else.
On the other hand, some languages
restrict what number facilities are avail¬
able for simplicity's sake. BASIC, for
instance, doesn't distinguish between
integers (counting numbers) and those
with decimal points; all numbers may have
decimal points. TRAC Language only
gives you integers to start, since it's easy
enough to program other klnda of number
behavior in dike Infinite precision).
However, ASCII is also used for
internal storage of alphabetical data in
many non-IBM systems, andit is also the
running form of a number of programming
languages, such as TRAC language (see
p. \3), TECO ^aeS-p. :_T. and GRASS
(aee P-^.)-
IBM’s deliberate undermining of the
ASCII code is a source of widespread anger.
(See IBM. p. 52,.)
2. EBCDIC (pronounced "Ebaadick.")
Extended Binary Coded Decimal. This was
the code IBM brought out with the 360.
passing ASCII by. (IBM seems to think of
compatibility as a privilege that must be
earned, i.e., paid for.) EBCDIC also al¬
lows numbers, the English alphabet, and
various punctuation marks. This Is used
to and from most IBM terminals ("2741
type"),
H ki f °-
HOLLERITH, meaning the column
patterns that go in on punched cards.
(They can eleo come out that way. if you
want them to.)
CARD-IMAGE BINARY, if for some
reason you want exact binary patterns
from your program, they can be punched
out as rows or columns on punch cards.
STERLING Just to show you how
comical things can get. the original PL/I
specifications (see p.3j ) allowed n urn be re
to be input end output in terms of Pounds.
Shillings and Pence (12 pence to the shil¬
ling. 20 shillings to the pound). No pro¬
vision was made for Guineas (the 21-ahU-
Ung unit) . or farthings, unfortunately.
MAGNETIC STORAGE
28
Oat* la punched Into cards according to
some plan associated with the program.
Beyond Those simple matters there la no
preordained arrangement for information on a
punch card; It all depends on what the program
calls for. But each separate piece or section
of information-- each bunch of consecutive
characters that together have a specific meaning
— are called a field .
A field can be a name, a number, an
amount of money, an alphabetical code repre¬
senting something, a numerical code represent¬
ing something, or other stuff. When the cards
go into the program, the program can pick ofT
the information it needs one field at a time--
putting the field in columns 1 to 17 into one
program variable, the field from columns nine
to ten Into another program variable, and ao
irmstjsvim
Some Tines n cioMes $*l$Goer.
Data usually has to be marshalled into
rows . or even regiments and battalions, before
it can go into a computer.
(Some people just get their data into a
computer by sitting at a terminal and typing
it in. perhaps answering questions typed to them
by a front-end program. But they’re the lucky
ones. Most of us have to get the data set up
on some kind of holding surface before it gets
fed in. That's an input medium . )
DATA MEDIA
A data medium ("medium" is the singular
of "media") is anything that holds the marks of
data outside the core memory of a computer.
Thus punched cards and punched paper tape
may be used as input media , used for putting
information into a computer. (Each medium
needs a corresponding input or output device ,
to whisk across the surface and translate Its
marks or holes into the corresponding electronic
pulses.)
There are three types of data media:
input , output and storage media. An input
medium carries the data in. An output medium
receives the results of a program; for instance,
a sheet of paper coming out of a printing device
is an output medium, as is a punched card or
punched paper tape.
Storage media are output media that may
be used as input media later on. Thus punched
cards and punched paper tape can be storage
media. But the better storage media use mag¬
netic recording (which ia faster and less bulky),
like magnetic tape and disks, or just plain
"diaka" as we generally call them. (See fuller
list of mag media under "Peripherals," p. 5^ ■>
The units and arrangements of data used
for input , output and storage are in principle
not necessarily the true ones of the data structure
used by the program . The blocks and records
of storage, for instance, may have irregular
data with pointers sitting in them. (Unfortun¬
ately there is some carryover, in that program¬
mers are tempted to use data structures which
are easy to store and run in and out, rather
than handling the true complexities of the sub¬
ject. This is always a temptation.)
Let us consider the units and arrangements
of data used for input and output and storage.
Theae are, respectively, fields, records, files
and blocks.
THE PUNCH CARD
Let's begin with s fun example: that
hoary old medium for input and output, the
punched (or "punch") card . The punch card
will ehow ua what a field is.
The punch card Is generally believed to
have been invented by Herman Hollerith (al¬
though the author's ln-lawa had bitter recollec¬
tions lo the contrary). It was first used on a
broad scale to count up the census of 1890, and
later became an early cornerstone of IBM, but
that's another story.
The punohea on a card represent a row
of information (such as a row of typed letters).
this is not obvious because the card is a rec¬
tangle rather than • fine. However, the length
of the card ia actually divided into eighty poai
tiona, each of which may hold one number,
alphabetic character or punctuation mark.
These positions are actually narrow columns,
eighty of them, with different positions In which
holes may be punched. One hole in a column
represents a numeral; which position in the
column specific■ what number. Two holes In
a column generally mean a letter of the alphabet,
three holes In a column mean a punctuation
—-
it f ult- ie <te*
*.#k
- Aawv,
tor+£r <s
»•* 7 e, * A
The punch card is an important example
of an input unit influencing the structure of
computer programs. It la convenient to use
fields on a punch card as the basic data struc¬
ture of a program and say, "That's the way it
has to be for the computer. In the worst cases
we see the workings of the "punch card men¬
tality" or "BO-column mind" (see box).
—r People will often thrust a punched data
card at you and ask, "What does this mean?"
Who knows? it may have lettering banged along
the top, showing what characters the holes rep¬
resent, but if these characters don’t Bhqw any¬
thing understandable, such as the person's name,
you're in the dark. The card may have pre¬
printed section lines dividing it up, but these
are rarely self-explanatory. It's often im¬
possible just to look at a punched card and
tell by eye what the individual fields are for,
or even where they begin and end; all that
depends on the program. Only someone who
understands the program, or at least knows
what fields the card is divided into and what
the characters represent there, can help.
Sometimes, in dismal systems we encoun¬
ter day-to-day-- like for university registration
— a punch card will have a person's name in
the first few columns, or worse, a personal
serial number . Other information continues
from there. These may or may not be recog¬
nizable. either from reading the holes by eye,
or from designations pre-printed on the card.
ASCII code. You can figure out from
the table the bit pattern for any letter, or
what any given combination of seven bits
means.
Example . Find the capital letter G
in the table. For the first three bits of the
code, look at the top of the column: 100.
For the next four, look sideways to the
left; 0111. So G is: 1000111.
(An eighth bit la used as a check on
the number of one* in the code; this la
called the parity bit. and either rounds to
an even number of bits (even parity) or an
odd number of blta (odd parity). Thus if
a code cornea through to the computer with
a wrong number of ones, the computer
can take remedial action.)
Those funny multlletter codes are for
controlling terminals and like that.
Pocket card courtesy of Computer
Transceiver Systems. Inc.
The aame principle of fields applies l n
other data media, especially magnetic tape and
disk. We may extend the notion of a field to
explain records and files.
A field , generally speaking, is a section
of positions on some medium reserved for one
particular piece of Information, or the data In it.
A record is a bunch of fields stored on
some medium which have some organized use,
(For instance, the accounting information held
by an electric utility company about a particular
customer is likely to be stored as a record with
at least these fields: account number, last name;
Initials; address; amount currently owed.)
A file is a whole big complete bunch of
information that is stored someplace. In many
applications a file Is composed of numerous
similar, consecutive records. For instance,
an electric company may well store the records
for all of its customers on a magnetic tape,
ordered by account number (account 000001
first).
Storing sequences of similar records in
long files is typical of business programs,
though perhaps this should begin to change.
It's especially suited to batch processing,
thst is. handling many records in the same
way at the same time. (See "System Programs.")
Now, the divisions of field, record and
file are conceptual: they are what the program¬
mer thinks about, based on the information
needs of a specific computer program.
BLOCKS
A block is something else, which may be
related only to quirks of the situation.
A block is s section of stored material,
divided either according to the divisions of the
data or peculiarities of the device holding it,
such as a disk drive. Short records may be
stored many to a block. If records are long
they may be made up of many blocks.
-♦In particular, tape blocks can be almost
any size, while disk blocks often have a certain
fixed size (number of characters or bits) based
on the peculiarities of the individual device.
(This can be a pain in the neck.)
On the other hand, due to. the quirks of
magnetic recording, your program usually can't
just change something in the middle of a block;
the whole disk block or tape file has to be re¬
placed. This is less trouble with a short disk
block than a long tape file.
If ‘t tr*rfo
it ©*■ice.
TRADITIONAL CONVEYEH-BELT PROGRAMS
Many traditional business programs are of
this type, reading In one data record at a time,
doing something to it (such as noting that an
Individual has paid the exact amount of his gaa)
and writing out a new record for that customer
on the current month's tape.
THE PROBLEM
Standardized fields, blocks and records
are often neceaaary or convenient. But, on the
other hand, the kinds of computer progreme
people find oppressive often have their roots in
this kind of data storage and Its associated styles
of programming, especially the use of fixed-field
record# as the be-ail and end-all. The more
Interesting use# of the computer (Interactive,
obliging, artistic, etc.) use a greater variety
of data structures.
---V'A
People's naive idee of "programming" ia often e reasonable
approximation to tha notion of "data structure." Data atructure
is how information ia aet u£ After It’s eet up. progreme
can twiddle it; but the twiddling options are based on how
the information is set up to begin with.
A CONCRETE EXAMPLE Suppose we went
to represent the genealogy of the monarchs of Eng-
England. so fer as ie known, in a computer data
Structure. NOTE THAT A DATA STRUCTURE IS
DIFFERENT FROM A PROGRAM: If several program¬
mers agree beforehand on a data structure, then
they can go separate ways and each can write a
program to do something different with it-- if they
have really agreed on a complete and exact layout.
which they may only think they’ve done.
First we consider the subject matter . Gen¬
ealogy is conceptually simple to us, but as data
is not as trivial as it might seem at first. Every
person has two parents and a specific date of birth.
Each pair of parents can have more than one child,
and individual parents can st different times share
parenthood with different other individuals.
Presumably we would Uke a data structure
that allows a program to find out who was a given
person's parent, who were a given person’s chil¬
dren, what brothers and slaters each person had.
and similar matters (so far aa is known by histor¬
ians-- another difficulty).
Note that just because it is simple to put this
Information in a wall chart, that does not mean it
it simple to figure out an adequate data structure.
Note too, that any aspect of data which
is left oifi cannot then be handled by (he program .
What’a not there is not there.
The easy way out is to use a language like,
say, TRAC Language, and uae Its basic units (in
this case, "forms") to make up a data structure
whose individual sections would show parentage,
dates, brothers and sisters and so on.
The braver approach is to try to set it up
for something like FORTRAN or BASIC, languages
which treat core memory more like a numerically-
addressed array or block, as does rock-bottom
machine language.
Let us assume that we have decided to use
an array-type data structure, for instance to go
with a program in the BASIC language on a 16-
bit minicomputer. We do not have much room
in core memory, so for each person in our data
structure we are going to have to store a sepa¬
rate record on s disk memory, and call it into
core memory as required.
After much head-scratching, we might
come up with something like the fallowing. It
is not a very good data structure. It is not a
very good date structure on purpose.
It useB a block of 26 words, or 448 bits,
per individual, not counting the length of his
name, which is an additional 8 bits per char¬
acter or space. However, this in itself Ib nei¬
ther good nor bad. It's more than you might
expect, but leas than you might need.
fincidentally, out of concern for storage
space, some date fields are packed more than
one to a 16-bit computer word. This is scorn¬
fully called bit-fiddling by computerfolk who
work on big machines and don't have to worry
about such matters.)
1
I monarch no. (if any) ,'aex-r
-Cl bit)
Individual’s own
2 1
1 aerial no~ ~ 1
(name)
3. !
* {
(two 16-bit words long)
mother
5
serial no.
father
6 <
aerial no.
brothers
7 !
aerial no.
(up to five)
8
9 !
10 1
11 !
sisters
12
aerial no.
(up to five)
13
14
15
16
17
data of 1st reign, if any
_ tt«t.(ll bits) Tno. months
data of 2d reign, if any
18 :
start (11 bits) ! no. months
female children,
18 |
1 aerial no.
up to five
20
■
21 1
22 i
male children.
23
24
aerial no.
up to five
25
1
26
27
28
Here are some assumptions I have embodied
in this data structure. That Is, I had them in
mind. (The parts you didn’t hsvs in mind srs
what get you later.)
Parents and children of monarehe
are included, as well as
monarchs.
All monarchs have s separate mon¬
arch number.
No monarch reigned more than
twice. (?)
No monarch or parent of a monarch
had more than five children
of one sex. (Note the danger
of these assumptions.)
We are not interested in grandchil¬
dren of monarchs unless they
are also monarchs, or siblings,
or parents of monarcha.
The information about the different
people can be input in any
order, as the years of reign
can be stepped through by a
program to find the order of
reign.
If this seems like too much bother, that is
in a way the point. Data atructurca must be
thought out . Since computers have no intrinsic
way of operating or or handling data (though
particular languages will restrict you in partic¬
ular ways), you will have to work all thie out,
and a carelessly chosen data structure will leave
something out, or fail to distinguish among im¬
portant differences, or otherwise have its revenge.
(For instance, if you haven’t noticed yet:
we left out legitimacy . For many purposes we
want to know which kings were bastards.)
(Self-test: is five bits long enough to ex¬
press the greatest number of months any English
monarch reigned? -- see "Binary Patterns." Or
do we have to fix this data structure on that
score also?)
To give you a sense of the sort of program
this data structure allows:
A program to ascertain how many kings
were the sons of kings would look at each entry
that had a monarch number, test whether the
monarch was male, and if male, would look at
the male parent's serial number. Then it would
look up that parent's entry, and see whether it
in turn had a monarch number, and if so, add
one to the count it was making. Then it would
go back to the entry it had been looking at.
and step on to the one after that.
This is actually a pretty lousy data struc¬
ture. The clumsiness of this approach to such
data-- and you ore welcome to think of a better
one-- shows some of the difficulties of handling
complex data about the real world. Things like
lengths of names and numbers of relatives pro¬
duce great irregularitiea, but make these kinds
of data no less worth of our attention.
We could odd lots of things to our data
structure (and so make it more unwieldy). For
instance, we might want to mark each aerial
number specially if it referred to someone who
was the offspring of a monarch. We could sim¬
ply set a particular bit to 1 in the serial number
for them (called a flag or tag ). We could also flag
dates and genealogies that are regarded as un¬
certain. There is no limit to (he exactness and
complexity with which information may be rep ¬
resented . But doing it right can, as always,
be troublesome.
A lot of computer people want to avoid
dealing with complex data; perhaps you can be¬
gin to see why. But we must deal with the
true complexities of information; therefore lan¬
guages and systems that allow complex informa¬
tion structures must become better-known and
easier to use.
THE FRONTIER: COMPLEX FILE STRUCTURE
The arrangements of whole files-- groups
of records or other info chunks-- are up to the
programmer. The structure of files is celled,
not surprisingly. file structure , and it is up to
the programmer to decide how hla files should
be arranged.
Aa explained already, that was the basic
block. We still have to keep the names aome-
whare, in a string area. Whether to keep this
In core all the time, or on disk. ia a decision
we needn’t go into hare.
Habits die hard. The notion of sequence--
even false, imposed sequence-- is deep in the
racial unconscious of computer people. An inter¬
esting concrete term shows this nicely. Because
computer people often think any file should hove
a basic sequence, they use the term inverted
file for a file that hsa been changed from its
basic sequence to another sequence. But increas¬
ingly, all the sequences are false and artificial.
Where now are inverted files? All files are in¬
verted if they’re anything.
Fortunately, the final frontier of data
structure is now increasingly recognised as the
control of complex storage of files on disk mem¬
ory. The latest fancy term for this is data base
system , meaning planned-out overall storage that
you can send your programs to like messengers.
The fact that IBM now has moved into this
area (with its intricate "access methods" and all
their Initials) means complex storage control has
filially arrived, although the pioneering work
was done by Bachman at GE some years ago
(see bibliography). Till the last few years,
external storage, with pointers and everything,
haa not been conveniently under the programmer’s
control except in crude weys. Finally we are
seeing ay sterna beginning to get around that
automatically handle complex file structures in
versatile ways that programmers can use more
aaally.
<^ 1 *
-UtK
1U LH
_. . , , - -ccepi a radically new
point of view, one that would liberate the opplic.tion
programmer’s thinking from the centralism of core
storage and allow him the freedom to act aa a nevlg,-
cause " “ d h B(8baS€ ■ This reorientation will
cause as much anguish among programmers aa the
■ B “ ry “ “"‘' m »«
Charles W. Bachman
(piece cited in Bibliography)
Remember the song that had
a pointer data structure?
(in alphabetical order)
ANKLE BONE
BACK BONE
FOOT BONE
► HEAD BONE
HIP BONE
KNEE BONE
NECK BONE
SHIN BONE
SHOULDER B(
THIGH BONE
Malcolm C. Harrison. Date-Structures and
Programming . Scott. Foresman. 1973.
-►This book CBn be recommended to
ambitious beginners. It has useful sum¬
maries of different languages, as well as
fundamental treatment of data structures
as they intertwine with specific languages.
An obscure and intricate 9tudy of the inter¬
changeability of data structures- 1 - how they
fundamentally interconvert-- has been the
longtime research of one Anatol Holt, who
calls hia work Mem-Theory . Mem is from
memory . and also, conveniently, a Hebraw
letter.
This is an extremely ambitious study,
as it in principle embraces not just much
or all of computer science, but perhaps
mathematics itself. Math freaks attention :
Holt has said he intended to derive all of
symbolic logic and mathematics from
relations and pointer structures . Let’s
hear it for turning Russell on hla head.
I don’t know if Holt has published
anything on it In the open literature or not.
However, he does have a game
available which seems weirdly to embody
these principles. The gamo of Mom is
available for $6.50 postpaid ($6.86 to
Pennsylvanians) from Stelledar. Inc.,
1700 Walnut St., Phila. PA 19103. It haa
beautifully colored pieces, looks deceptive¬
ly simple, and is unlike anything , except
discrete abstractive thinking itself. Recom¬
mended .
Charles W. Bachman. "The Programmer as Navi¬
gator." CACM Nov 1973.
Bachman was the prime mover in the
development of large linked disk data sys¬
tems at General Electric; he ia the Pioneer.
Thta ia about big n-dimensional stuff.
David Lefkovitz, File Structures lor On-Line
Systems . Spartan-Hayden Books, $12.
Alfonso F. Cardenas, "Evaluation of File Organ¬
ization-- a Model and System " CACM
Sep 73. 540-548. Not surprisingly. R
turns out that different file organizations
have different advantages.
Edgar H Sibley and Robert W. Taylor. "A Data
Definition and Mapping Language." CACM
Dec 73. 750-759.
Example of current sophisticated
approachea: a whole language for nailing
the data Just the way it should be. Haa
helpful further citations
j)ATA -STfOC.TOK.e-.
INFORMAL SttVirj
On# of the commonest and most destructive
myths about computers is the ides that they "only
deal with number*." This is TOTALLY FALSE.
Not only is it a ghastly misunderstanding, but it is
often an intentional misrepresentation, and as such,
not only is it a misrepresentation but it is a damned
lie. and anyone who telle It is using "mathematics"
as a wet noodle to beat the reader with.
Computers deal with symbols and patterns.
Computers deal with symbols of any kind --
letters, musical notes. Chinese ideograms, arrows,
ice cream flavors, and of course numbers. (Num¬
ber* come also in various flavors, simple and
baroque. See chocolate box^ p. .
Data structure means any symbols and pat¬
terns set up for use in a computer. It means what
things are being taken into account by a computer
program, and how these things are set up-- what
symbol* and arrangements are used to represent
them.
The problem, obviously, is Representing
The Information You Want Just The Way You Want It,
in all its true complexities.
(Thia is often forbiddingly stated as "making
a mathematical model"-- but that's usually in the
rhetorical, far-fetched and astral sense in which
all relations are "mathematical'' and letters of the
alphabet are considered to be a special distorted
kind of number.)
Now it happens that there are many kinds of
data structure, and they are interchangeable in
intricate ways.
The same data, with all Its relationships and
intricacies, can be set up in a vast variety of ar¬
rangements and styles which are inside-out and
upside-down versions of each other. The same
thing (say. the serial number, 24965, of an auto¬
mobile) may be represented in one data structure
by a set of symbols (such as the decimal digits
2, 4, 9. 6 , 5 in that order), and in another data
structure by the position of something else (such
as the 24965th name in a list of automobile owners
registered with the manufacturer).
Furthermore, many different forms of data
may be combined or twisted together in the same
overall setup.
The data structure chosen goes a long way
in imposing techniques and styles of operation on
the program.
On the other hand, the computer language
you use has a considerable effect upon the data
structures you may choose. Languages tend to
impose styles of handling information . The deci-
aion to program a given problem in a specific lan¬
guage, such as BASIC or COBOL or APL or TRAC
Language, either Jocks you into specific types of
data structure, or exerts considerable pressure to
do it a certain way. In most cases you can't set it
up just any way you want, but have lo adjust to
the language you are using - slthough today's
languages tend to allow more and more tvDes of
data.
An array (also called a table ) is a section
of core memory which the programmer cordons off
for the program to put and manipulate data in. if
SPENCER is the name of the array , then SPENCER (1)
is the first memory slot in it, SPENCER(2) is the
second, and ao on up to however big it le.
(You can get a feel for how this ordin¬
arily relates to input from outside-- see "How
Data Comes, Coes . and Sits nearby . )
The contents of a numerical field, or
piece of data coming in, can simply be stuffed
by the programmer Into a variable.
The contents of a record , or unified
set of fields, can get put into an array. The
program can then pick into it for separate
variables, if desired, or just leave them
there to be worked on .
Then you twiddle your variables with
your program as desired.
When you've done one record, you
repeat. That's how lots of business programs
go. Some other routine kinds, too.
FANCY STRUCTURES
Many forms of advanced programming are
based on the idea that things don't have to be stored
next to each other, or in any particular order.
If things aren't next to each other, we need
another way the program can tell how they belong
together.
A pointer , then-- sometimes called a link- -
is a piece of data that tells where another piece of
data is, in some form of memory. Pointers often
connect pieces of data.
A pointer can be an address in core memory: it
can be an address on disk ( diskpointer ); it can
point to a whole string of data, such as a name,
when there is no way of knowing in advance how
long the siring may be ( stringpointer ).
A series of pieces of data which point to each
other in a continuing sequence is called a threaded
list .
For this reason the handling of data held together
by pointers-- even though it may make all sorts of
different patterns-- is called list processing . (The
(The term "Jisl processing" might seem to go a-
gainst common sense, as it might suggest something
like, say, a laundry list, which is structured in a
very simple blocklike form. But that's what we
call it.)
Prominent list-processing languages include
SNOBOL, L 6 and LISP (see p.^l )■ There is argu¬
ment as to whether TRAC Language is a list-proc¬
essing language.
PAST-CHANGING DATA
One of the uses of such structures is in
strange types of programs where the interconnec¬
tions of information are changing quickly and
unpredictably 3uch operations happen fast In
core memory. In this kind of programming (for
which languages like LISP, SNOBOL and TRAC
Language are especially convenient), the pointers
are changed back and forth in core memory, every
which way, ell the time. Presumably according to
the programmer's fiendish master plan-- if he'a
gotten the bugs out. (See Debugging, p .30 .)
FANCY FILES
But these structures are not restricted to
data in core memory . Complex and changeable
files can be kept on disk In various ways by the
same kind of threading (called "chaining" on mass
storage).
CHAINED FILE ON DISK
Another way of handling changeable files is
through a so-called direclory block, which keeps
track of where all the other blocks are stored.
[ \ i|oclr
Si *Y
d n
But these techniques, you see, may be used
in both fast and slow operations, and for any pur¬
pose. so trying to categorize them tends not to be
helpful. (Note also that these techniques work
whether you're dealing with bits , or characters ,
or any other form of data.)
Note: By decent standards of English,
the word data should be plural, datum sin¬
gular. But the matter is too far gone: data
is now utterly singular, like "corn" and
"information," a granular collective which
may be scooped. poured or counted.
But I draw the line at media , Media
are many, "media" ia plural!
Here are some interesting structures that
programmers create by list processing:
RINGS (or cycles ). These are arrangements
of pointers that go around in a circle to their first
item again.
TREES. These are structures that fan out.
(There are no rings in a tree structure, technically
speaking.)
h CLASId KWMKWTAW6-
"Computers put everything into pigeonholes."
Wrong. People pul things into pigeon¬
holes. And designers of computer programs
cun set up lousy pigeonholes, if you let 'em.
More sophisticated programming cun often
avoid pigeonholes entirely.
Plainly, then. It is these overall structures
that we really care about; but to understand over¬
all structures, we need an idea of all the different
form* of data that may be put in them .
VARIABLES AND ARRAYS
The earliest data structures in computers,
and still the predominating ones, are variables and
arrays. (We met them earlier under BASIC, see
fP and APL , see jj. ££. 5 :)
A variable ia a spaca or location in core
memory. (For convenience, most programming
language* allow the programmer to call a variable
by a name, ao that he doesn't hsve lo keep (rack
of ita numerical addreaa.)
/^Y
O □ a □ a cl a a
GRAPH STRUCTURES (sometimes called
piexea ). Here the word "graph" is not used In the
ordinary way. to mean a diagrammatic sort of pic¬
ture, but to mean any structure of connected
points. Rings and trees are special casea of graph
atructure*.
ASif
People who went to feel With It
occasionally use the term "bit" for
any old chunk of information. like a
name or address. This is Wrong.
A Bit is the smalleat piece of binary
information, an itam thal can be one
of two things, like heads or tails,
X or 0. one or zero; end all olhar
information can ba packed Into a
countable number of bite. (How many
may depend on the data structure
chosen,)
As a handy rule of thumb:
every latter of the alphabet or punc¬
tuation mark ia eight bits (see ASCII
box); for heavy storage of evaryday
decimal numbers. every numerical
digit can be further packed down (lo
four bit* in BCD code)
WHERE TO GET IT
25
ROUND (an obacure and donnish Joke)
p. (he Greek letter "rho," Is an APL operator
/ for testing the size of arrays, When used
In the one-sided format, It gives the sites
of each dimension of an array.
Thu * R si
ftk . when A ts L *
Is 2 2. L J
And now
/j'YOUR BOAT'
/ equals 9, since there are 9 letters
In the array 'YOUR BOAT';
j'YOUR BOAT’
rr
since ft 9 is 1, and
cyy> 'YOUR BOAT'
is likewise 1.
This language la superb for "8010011110” programming,
including heavy number crunching and etper
indentation with different formulas on small
data bases. (Big data bases are a problem.)
It is also not bad for a variety of simple business
applications, such as payroll, accounting,
billing and inventory.
FAST ANSWERBACK rN APL
If you want quick answers, the APL terminal
just gives you the result of whatever you type in.
For instance,
3 * 4
will cause it to print out
12
and the same goes for far less comprehensible
stuff like
7 £ ^ <j> 71234 (carriage return)
typed-in array
PROGRAMS IN APL
But the larger function of APL is to create
programs that can be stored, named and carried
out at a later time.
For this, APL allows you to define programs,
a line at a time. The programs remain stored in the
system as long as you want. Using the "Del"
operator (V), you tell the system that you want to
put in a program. Del causes the terminal to help
you along in various ways.
A nice feature is that you can lock your APL
programs, that is, make them inaccessible and
unreadable by others, whether they are
programmers or not. in this case you define a
program starting with the mystical sign del-tilde
(instead of del ( V) ■ and Invoke the names
of dark spirlta.
APL, like BASIC, can be classed aa an "algebraic"
language— but this one la built to please
real mathematicians. with high-level stuff
only they know about, like Inner and Outer
Products.
Paradoxically, thia makes APL terrific for teaching
these deeper mathematical concepts, helping
you see the consequences of operations and
the underlying structure of mathematical
things. Matrix aljebra, for Instance, can be
visualized a lot better by working up to it
with lesser concepts (ilke vectors and
inner products) enacted on an APL terminal.
It would be really swell if someone would pul to¬
gether a tour-guide book of higher mathem¬
atics at the grade/highachool level for people
with access to APL.
Interestingly, Alfred Bork (U. of Cal. at Irvine)
is taking a similar approach to teaching
phyaica, using APL aa a fundamental
language in hla phyaica courses.
SNEAKY REPEATER STATEMENT IN APL’
One of the APL operator*, "iota" { x).
teems to make its own program loop within a line.
When used one-sided, it furnishes a series of
ascending numbers up to the number It's operating
on. This until th« last one Is reached.
You type : J x x T
APL replies : S 8 9 12 15 18 21
In other words, one-sided lots looks to ba
doing It* own llttla loop, Increasing Its starting
number by 1, until It get* to the value on lte right,
and chugs on down the line with each.
Very sneaky way of doing a loop
However! It Isn't really looping, exactly.
What the tots does Is create a one-dimensional
array , a row of integers from 1 up to the number
on its right. Thia result ta whet then move* on
leftward
IBM doesn't sell APL services. Their time¬
sharing APL la available, however , from various
suppliers. Of course, that means you probably
have to have an IBM-type terminal, unless you find
a service that offers APL to the other kind - an
addition which seems to be becoming fashionable.
Usual charge ie about ten bucks an hour
connect charge, plus processing, which depends
on what you're doing. It can easily run over $15
an hour, though, and more for heavy crunching
or printout, so watch it,
The salesman will come to your house or
office, verify that your terminal will work (or
tell you where you can rent one). patiently show
you how to sign on, teach you the language for
maybe an hour If he’s a nice guy, and proffer
the contract.
—►APL services are probably safer to sign
onto. In terms of risked expenses, than moat other
time-sharing systems. (Though of course all
time-sharing involves financial risk.) Because
the system Is restricted only and exactly to APL,
you're not paying for capabilities you won't be
using, or for massive disk storage (which you're
not allowed in most APL services anyway), or
for acres of core memory you might be tempted
to HU.
—► In other words, APL is a comparatively
straight proposition, and highly recommended if
you have a lot of math or statistics you'd like to do
on a fairly small number of cases. Also good for
a variety of other things, though, including fun.
Different vendors offer interesting variations
on IBM’s basic APL\360 package, as noted below.
In other words. theyYompete with each other in
part by adding features to the basic APL\360 pro¬
gram, vying for your business. Each of the ven¬
dors listed also offers various programs in APL
you can use interactively at sn IBM-type terminal,
in many cases using an ordinary typeball and not
seeing the funny characters; though how clear and
easy these programs are will vary.
And remember, of course, that you can do
your own thing, or have others do it for you,
using APL.
APL is also available on the POP-10. and
presumably other non-IBM big machines.
THE VENDORS
Scientific Time-Sharing Corporation (7 316 Wiscon¬
sin Ave., Bethesda MD 20014) calls i(s
version APL*PLUS. They’ll send you a
nice pocket card summarizing the commands.
APL*PLUS offers over twentyfive
concentrators around the country, per¬
mitting local-call services in such metro¬
politan centers as Kalamazoo and Rochester.
(Firms with offices in both cities. please
note.)
They also have an "AUTOSTART"
feature which permits the chaining of pro¬
grams into grand complexes, so you don’t
have to call them all individually.
'» APL'PLUS charges the following for
storage, if you can dig it: $10 PER MILLION
BYTE-DAYS. (A byte Is usually one
character. ) The census is probably taken
once a day.
This firm also services ASCII ter¬
minals. which some people will consider
to be a big help. That means you can have
Interactive users of APL programs at ASCII
terminals, and that you can also program
from the few APL terminals that aren't of
the IBM type.
Time Sharing Resources, Inc. (777 Northern Blvd.,
Great Neck, N Y. 11022) offers a lot of APL
service, including text systems and various
kinds of file handling, under the name
TOTAL/ APL.
Among the interesting festures
Time Sharing Resources, Inc. have added
is an EXECUTE command, which allows an
APL string entered at the keyboard in
user on-line mode to be executed as straight
APL. Thia is heavy .
Perhaps the most versatile-sounding APL service
right now is offered by, of all people, a
subsidiary of the American Can Company.
American Information Services (American
Lane. Greenwich CT 06830) calls their
version VIRTUAL APL, meaning that it can
run in "virtual memory”- - a popular
misnomer for virtually unlimited memory--
and consequently the programmer is hardly
subject to apace limitations at all. Moreover,
files on the AIS system are compatible with
other IBM languages , so you can use APL to
try things out quickly and then convert to
Fortran, Cobol or whatever. (Or. conversely,
a company may go from those other languages
lo APL without chsnglng the way their flies
are stored on this service .) APL may indeed
Intermix with these other languages, how
la unclear.
And the prices look especially good:
$8.75 an hour connect, $15 a month minimum
(actually their minimum disk apace rental
-- 1 IBM cylinder-- so for that amount you
get a lot of storage). But remember there
are atlU core charge*, and $1 per thousand
characters printed or transferred to storage.
In the Weal, a big vendor is Proprietary Computer
Systems. Inc. , Van Nuya. California.
TERMINALS
For an APL terminal, you might Just want a
2741 from IBM (about ■ hundred a month, but on a
year contract).
Or see the Hat under "Terminal*" (p.^),
or ask your friendly APL company when you algn up.
Two more APL terminals, mentioned here
instead of under "Terminals" for no special reason:
Tektronix offers one of its greenie graphics
terminals (see flip Bide) for APL (the model 4013).
This permila APL to draw pictures for you. it
seems to be an ASCII-type unit.
Computer Devices, Inc. supposedly makes an
an APL terminal uBing the nice NCR thermal printer,
which is much faster and quieter than a mechanical
typewriter. Spookier. though. And the special
paper costs a lot of money.
BIBLIOGRAPHY
Iverson has a formal book. Ignore it unless you’re
a mathematician: Kenneth E. Iverson,
A Programming Language . Wiley, 1962.
Paul Berry, APL\360 Primer . Student Text .
Available "through IBM branch offices," or
IBM Technical Publications Department.
112 East Post Road. White Plains, NY 10601.
No IBM publication number on it, which tB
sort of odd. 1969.
-♦This is one of the most beautifully
written, simple. cl?ar computer manuals
that is lo be found. Such a statement may
astound readers who have seen other IBM
manuals, but it's true.
A.D. Falkoff and K.E. Iverson, APL\,360 Users'
Manual . Also available from IBM. no
publication number.
POCKET CARDS (giving very compressed sum¬
maries) are available from both:
Scientific Time Sharing Corp.
(see WHERE TO GET IT)
Technical Publications Dept., IBM.
112 East Post Road. White
Plains, N.Y. 10601.
Ask for APL Reference
Data card S210-0007-0. May
cost a quarter or something.
Paul Berry. APL\lI30 Primer . Adapted from 360
manual. Same pub. But for version of APL
that runs on the IBM 1130 minicomputer.
Roy A. Sykes, "The Use and Misuse of APL."
$2 from Scientific Time-Sharing Corp..
7316 Wisconsin Ave. . Bethesda MD 20014.
A joker for you math freaks. Trenchard More,
Jr.. "Axioms and Theorems for a Theory of
Arrays." IBM Journal of Reach . * Devi ..
March 73. 135-157. This is a high-level
thing, a sort of massive set theory of APL.
intended to make APL operators apply to
arrays of arrays. and lead ultimately to the
provability of programs.
"Get on Target with APL.” A suggestive circular
sales thingy. IBM G520-2439-0.
IBM has a videotaped course in APL by A.J. Rose.
(Done 1968.)
£^>What you really need to get started is Berry's
Primer, Falkoff and Iverson’s manual, and a pocket
card. Plus of course the system and the friend to
tutor you.
Power and simplicity do not often go together.
APL is an extremely powerful language for
mathematics . physics, statistics, simulation
and so on.
However, it is not exactly simple. It's not essy
to debug. Indeed. APL programs are hard
to understand because of their density.
And the APL language does not fit very well on
APL is not just a programming language.
It is also used by some people as s definition or
description language, that Is, a form of notation
for stating how things work (laws of nature,
algebraic systems, computers or whatever).
For Instance, when IBM's 360 computer
came out, Iverson and hi* friends did a very
high-class article describing formally in APL
Just what 360* do (tha machine's architecture).
But of course thia was even less comprehensible
than the 360 programming manual.
Falkoff. A.D. . K.E. Iverson and E.H.
Sussenguth. "A Formal De»cription
of System/360.” IBM System* Journal ,
v .3 no. 3. 1964.
The formal deacriptlon In APL.
IBM 9y»tem/36C Operating System : Aaaembler
Language . Document Number
C28-6514-X (where XU* numbar
signifying th* lateat edition). IBM
Technical Publication*. Whit* PUln*
New York.
The Menual
Few people know all or APL. or would want to.
The operations are diverse and obscure.
and many or them are comprehensible only
to people in mathematical fields.
However. if you know a dozen or so you can
really get off the ground
As In BASIC, you can use subscripts to
get at specific elements in arrays. Referring to
the examples above, if you type
JOE [2]
you get back on your typewriter its value
and If you type
NORA [2.^
you get back
d
There are basically four kinds of information
used by APL, and all of them can be put in arrays.
Three of these types are numerical, and arrays of
them look like this on paper:
Integer arrays: 2 4 -6 8 10 2048
Scalar arrays: 2.5 '3.1416 0.001 2795333.1
(a scalar Is something that can be
measured on a ruler-like scale,
where there are always points
in betweeen.)
Logical arrays: 1 0 0 0 1 0 l
(these arrays of ones and zeroes are
called "logical" for a variety of
reasons; in this case we could call them
"logical" simply because they are used
for picking and choosing and deciding.)
These three numerical types of information may be
freely intermixed in your arrays. One more type,
however. 1 b sllowed. It’s hard to figure out from
the manuals, but evidently this type can't be
mixed in with the others too freely. We refer to
the alphabetical or "literal" array, as in
The quick brown fox jumped over the lazy dog.
Now , pre-written APL programs can print out
literal information, end accept it from a user at
a terminal , which is why APL is good for the
creation of systems for naive users (see "Good-Guy
Systems," p. 'J).
Literal vectors may be picked apart,
rearranged and assembled by all the regular APL
operators. That's how we twiddle our text.
CRASHING THE SYMBOLS TOGETHER
Now that we know about the operators and
the array*, what does APL do?
It works on arrays, singly and in pairs,
according to those funny-looking symbols, as the
APL processor scans right-to-left.
IVERSON’S TAFFY-PULL
A number of basic APL operators help you
stretch, squish and pull apart your arrays.
Consider the lowly comma (called "ravel," which
mean* the same aa "unravel").
,A forget A'a old dimensions,
make it one-dimensional.
A.B make A and B one long
one-dimensional array.
Here la how we make things appear and disappear.
("Compreaalon.")
A/B A must be a one-dimensional
array of ones and zeroes.
The result ia those elements
of B selected by the ones.
Example:
1 0 1 / c a t
results in
The opposite alath has the opposite effect,
inserting extra null elements where there
are zeroes
1 1 0 l\3 5 »
reaulta in
3 5 0 9
Here's another selector. Thie operator
takes (he first or last few of A, depending on sin
and sign of B:
Bf A
and B ^ A ia the opposite .
If you want to know the relative position* of
number* of different sice* in a one-dimenaional
array.
^ (name of array)
will tell you It gives you the position#. in order
of else, of the numbers. And ^ does it for
descending order.
These are lust samples. The list goes on
and on.
SAMPLE PROGRAMS
Here is an APL program that types out
backwards what you type in. First look at the
program, then the explanation below.
V REV
l ') '*-0
W 0-*'
V
Explanation . The down-pointing (riangle9
("dels") symbolize the beginning and end of a
program, which in this case we have called REV.
On Line 1, the "Quote-Quad" symbol (on the right)
causes the APL processor to wait for alphabetical
input. Presumably the user will type something.
The user's line of input is stuffed into thing or
array 1. The user's carriage return tells the APL
processor he has finished, so it continues in the
program. On the second line. APL takes array 1
and does a one-sided <£> to it. which happens to
mean turning it around. Left-arrow into the
quote-quad symbol means print it out.
Because of APL's compactness, indeed, this
magnificent program can all go on one line:
^ REV
V
First the input goes into I, then the processor does
a p I (reversal) and puts it out.
And here is our old friend, the fortune-cookie
prisoner.
V INF
Q 4— 'HELP. 1 AM CAUGHT IN A LOOP*
-> 1
V
On line 1 the program prints out whatever's in
quotes. And line 2 causes it to go bock and do
line 1 again. Forever.
THE T«T-A»|t>-&eAWeH 'VIM.
It should be mentioned at this point that
branching tests are conducted in APL programs
by specifying conditions which are either true or
false, and APL's answer is 1 if true, 0 if false.
(This is another thing these logical arrays are for.)
Example:
This operation leaves the number 1, because 3
is greater than 2. So you could branch on a teat
with something like
—> 7 * A > B
which branches to line 7 in the program if A is
greater than B. and is ignored (as an unexccutable
branch to line zero) if B is greater than A.
Some love It, some hate it.
THE APL ENVIRONMENT
Aside from Ihe APL language itself, to
program in APL you must learn a lot of "system"
commands, alphabetical commands by which to telt
the APL processor what you want to do in general
-- what to store, what to bring forth from storage,
and so on.
Ordinarily you have a workspace . a collec¬
tion of programs and data which you may summon
by name. When it comes-- that ia, when the com¬
puter has fetched this material and announced on
your terminal that It la ready-- you can run the
program* and use the data in your workspace.
You can also have passwords for your different
workspaces, so others al other terminals cannot
tamper with your stuff.
This ia not the place to go into the syatem
commands. IT you're serious, you esn learn them
from the book or the APL salesman,
There are many, many different error
messages that the APL processor can send you,
depending on the circumstances. It is possible
to make many, many mlalakes in APL, and
there are error messages for all of them . All
of them, that ia. that look to the computer like
errors: if you do something permissible that's
not what you intended, the computer will not
tell you.
But It ia a terminal language, designed to
help people muddle through.
HWf
mwifoe ufcMKSfUi
Of
Iverson's notation is built around the
curious principle of having the same symbols mean
two things depending on context. (Goodness
knows he uses enough different symbols; doubling
up at least means he doesn't need any more.) It
turns out that this notation represents a consistent
series of operations in astounding combinations.
The overall APL language, really. Is the
carrying through of this notation to create an im¬
mensely powerful programming language. The
impetus obviously came from the desire to make
various intricate mathematical operations easy to
command. The result, however, is a programming
language with great power for simpler teaks aa well.
Now, the consequences of this overall idea
were not determined by God. They were worked
out by Iverson, very thoughtfully, so as to come
out symmetrical-looking and easy to remember.
What we see is the clever exploitation of apparent
but Inexact symmetries in the ideas. Often APL’s
one-sided and two-sided pairs of operators are
more suggestively similar than really the same
thing.
When Iverson assigns one-sided and two-
sided meanings to a symbol, often the two meanings
may look natural only because Iverson is such an
artist. Example:
two-sided one-sided
AX B a B
A times B the sign of B
This makes sense. To argue that it is Inherent in
"taking away half the idea of multiplication."
however, is dubious.
Some symmetries Iverson has managed to
come up with are truly remarkable. The arrow,
for instance. The left arrow:
Assignment statement: B (which
may have been computed during
the leftward scan) is assigned
the name of A;
and the right arrow:
—* B
The jump statement, where B
(which may have been com¬
puted during Ihe leftward scan)
is a statement number; the
program now goes and execute*
that line.
This symmetry is mystically interesting because
the assignment and jump statements are so basic
to programming.
Or consider this:
print X.
X«-Q
take input from the user and
stuff it into X.
Another weird example: supposedly the
conditional branch
—> b/a
(one way of writing, "jump to A if B is true")
ia a special case of the "compression" operator.
(Berry 360 primer. 72 and 165.) This is very
hard to understand, although it seems clear while
you're reading it.
On the other hand, there is every indication
that APL Is so deep you keep finding new truths
in It. (Like Che above paragraph.) The whole
thing is just unbelievable . Hooray for all that.
APL FOR USER-LEVEL SYSTEMS
(See "Good-Guy Systems." p. I> )
Because APL can aoiicit text input from a user and analyze II,
tha language Is powerful for the creation of uaer-level environments
and ay atom*-- with the drawback, universal to all IBM terminals,
that Input line* mual end with specific characters, tn other word*,
it can't be as fully Interactive a* computer languages that use ASCII
terminals.
Needlaas to say, the mathematical elegance and power of the
system la completely unnecessary for most user-level system*. But
it's nlc* to know it's there.
APL la probably best for systems with well-defined and seg¬
regated files - "array type problems." like payroll, account* and
so on. It is not suited for much larger amorphous and evolutionary
stuff, the way Hat languages like TRAC are. Don't use APL 1/
you're going to store Urge evolving texts or huge brokerage data
base*, like what tanker* are free In the Mediterranean
Good luck! The quickest payoff may lie in ualng APL to replace buaineae
form* and hasten the flow of information through a company. A
salesman on the road with an APL terminal, for instance, can at once
enter hla order* in the computer from the customer'# office. checking
inventory directly . If the program ia up.
23
Here is another example showing how we chug
along the row of symbols and take it apart, Again,
the alphabetical entities represent things.
__ first operation (one-sided),
second operation (two-sided)
Try dividing up these examples:
Qp ROMEO
ELEANOR <3> SAM SUSIE
One more thing needs to be noted. Not only
can we work out the sequences of operations, from
right to left, between the symbols; the computer can
carry them out in a stable fashion . Which is of
course essential.
INSIDE
The truth of the matter 1 b that APL in the com¬
puter is a continuing succession of things being
operated on and replaced iii the work area.
first thing
fl ^YAROli
thing that results from operation Pf
done to that by UG *Y
and so on.
What is effectively happening is that the APL
processor is holding what it's working on in a
holding area. The way it carries out the scan of
the APL language, there only has to be one thing
in there at a time.
(tt t
Suppose we have a simple user program,
Y + - Z
Starting at the right of this user program , the
main APL program puts Z into the work area. That’s
the first thing. Then, stepping left in the user
program, the APL processor follows the rules and
discovers that the next operation makes It
- Z
which happens to mean, "the negation of Z." So it
carries this out on Z and replaces Z with the result.
-Z. Then, continuing to scan leftward, the APL
processor continues to replace what was In the work
area with the result of each operation in the suc¬
cessive lines of the user program, till the program
la completed.
l- rcij/t /
p -z
r'|l.u 1 1*1 <1
•y 4 -r
SOME APL OPERATORS
It would be insane to enumerate them all,
but here is a sampling of APL’s operators. They're
all on the pocket cards (see Bibliography).
For old times' sake, here are our friends:
(And a cousin thrown in for symmetry.)
♦A plain A
(whatever A should happen to be)
A+B A plus B
(whatever A should happen to B.
heh heh)
-B negation of B
A-B A minus B
xB the sign of B
(expressed as -1,0 or l)
AxB A times B
And here are some groovies:
! A factorial A
(1*2* 3 ... up to A)
A! B the number of possible
combinations you can get from B.
taken A at a time
?A a random integer
taken from array A
A?B take some Integers at random
from B. How many? A.
But, of course, APL goes on and on. There
are dozens more (including symbols made of more
than one weird APL symbol. printed on top of each
other to make a new symbol).
Consider the incredible power. Single APL
symbols give you logarithms, trigonometric
functions, matrix functions, number system conver¬
sions, logs to any arbitrary base, and powers of e
(a mysterious number of which engineers are fond).
Other weird things . You can apply an oper¬
ation to all the elements of an array using the /
operator: +/A is the sum of everything in A, x/A
is the combined product of everything in A. And
so on. Whew.
As you may suspect. APL programs can be
incredibly concise. (This is a frequently-heard
criticism: that the conciseness makes them hard
to understand and hard to change.)
MAKE YOUR OWN
Finally and gloriously, the user may define
hia own functions, either one-sided or two-sided,
with alphabetical names. For instance, you can
create your own one-sided operator ZONK, as in
ZONK B
and even a two-sided ZONK,
A ZONK B
which can then go right in there with the big boys:
A ^ ZONK \ | B
Don't ask what it means, but it's allowed.
APL THINGS , TO GO WITH YOUR OPERATORS
As we said, APL has operators (already
explained) and things . The things can be plain
numbers, or Arrays (already mentioned under
BASIC) . Think of them as rows, boxes and
superboxes of numbers:
2 4 6 8 10 a one-dimensional thing
2 4
35 a two-dimensional thing
s a
6 • s three-dimensional thing,
seen from the front. Maybe
we better look at the levels
side by side:
13 2 4
5 7 6 8
APL can have Things with four dimensions, five and
so on, but we won’t trouble you here with pictures.
Oh yes, and finally a no-dimensional thing.
Example:
75.2
It is called no-dimensional because there is only
one of it, so it is not a row or a box.
Seriously, these are arrays , and Iverson's
APL works them over, turns them Inside out, twists
and zaps through to whatever the answers are.
As in BASIC and TRAC, the arrays of APL
are really stored in the computer's core memory,
associated with the name you give them. The
arrays may be of all different sizes and dimen¬
sionality:
" fT.5 7.1 89.00 61
(empty array, but a name is
saved for it.)
QeeI
1371416]
(a zero-dimensional array,
since it's only one number.)
Each array is really a series of memory locations
with its label and boxing information— dimensions
and lengths-- stored separately. One very nice
thing about APL ia that arrays can keep changing
their sizes freely, and this need be of no concern
to the APL programmer. (The arrays can also be
boxed and reboxed in different dimensions just by
changing the boxing information-- with an operator
called "ravel.")
FRE«C 5 !
a mini that does nothing but APL,
ia now available from a Canadian firm for the mere pittance of
THREE THOUSAND FIVE HUNDRED DOLLARS,
the price of many a mere terminal. This according to
Computerworld , 10 Oct 73.
Run. don't walk, to Micro Computer Machines. Inc..
4 Lansing Sq.. WUlowdale. M2J 1T1, Ontario, Canada. That
S3500 gets you a 16K memory, the APL program, keyboard and
numerical keyboard, and plasma display. Cassette (which
apparently stores and retrieves arrays by name when called
by the program) is $1500 extra. RUNS ON BATTERIES. Sorry,
no green stamps. (Note that the APL processor takes up most
of the 16K, but you can get more.)
The rumor that IBM has APL on a chip , inside a 8electrlc
— which therefore does all these things with no external
connection to any (external) computer-- remain# unsubstantiated.
The rumor has been around for some lime.
But it’s quite poealble.
The thing ia, it would probably destroy IBM'a entire
product line-- and pricing edifice.
22
TWO-SIDED OPERATORS
SAME SYMBOLS WORK BOTH WAYS
Some people call it a "scientific" language.
Some people call it a "mathematical" language.
Some people are most struck by its use for inter¬
active systems, so to them it’s an interactive
language. But most of us just think of it as THE
LANGUAGE WITH ALL THE FUNNY SYMBOLS,
and here they are:
*punoc*w+cIA\sQ;f'A
<*S2=>)V:l_(+T-+-l~0?L-
12 3846 5 7]9. BFlUN+ITOQD+
PRVCAZ*WYEMO / XL,SJGXH
Enthusiasts see it as a language of incon¬
ceivable power with extraordinary uses. Cynics
remark that it has all kinds of extraordinary
powers for inconceivable uses— that is, a weird
elegance, much of which has no use at all, and
some of which gets in the way.
This is probably wrong. APL is a terrific
and beautiful triumph of the mind, and a very
useful programming language. It is not for every¬
body, but neither is chess. It is for bright chil¬
dren, mathematicians, and companies who want
to build interactive systems but feel they should
stick with IBM.
APL is one of IBM's better products, probably
because it is principally the creation of one man,
Kenneth Iverson. It is mainly run on 360 and
370 computers, though implementations exist
for the DEC PDP-10 and perhaps other popular
machines. (Actually Iverson designed the lan¬
guage at Harvard and programmed it on his own
initiative after moving to IBM; added to the pro¬
duct line by popular demand, it was not a planned
product and might in fact be a hazard to the firm,
should it catch on big.)
APL is a language of arrays, with a fascinat¬
ing notation. The array system and the notation
can be explained separately. and so they will.
Let's just say the language works on things
modified successively by operators . Their order
and result is based upon those fiendish chicken
scratches, Iverson notation.
THAT NIFTY NOTATION
The first thing to understand about APL
is the fiendishly clever system of notation that
Iverson has worked out. This system (sometimes
called Iverson notation) allows extremely complex
relations and computer-type events to be expressed
simply. densely and consistently.
(Of course, you can't even type it without
an IBM Selectric typewriter and an APL ball.
Note the product-line tie-in.)
In old-fashioned notations, such as ordinary
arithmetic, we are used to the idea of an operator
between two things. Like
These, too, occur in APL; indeed, APL
can also nest two-sided operators-- that is, put
them one inside the other, like the leaves of
a cabbage. Old-fashioned notations nest with
parentheses. But APL nests leftward. It works
according to a very simple right-to-left rule.
t X y X 2 + 2
the result of this
is operated on by
the next thing and operator,
yielding another result
which is in turn operated on by
the next thing and operator,
yielding final result.
ONE-SIDED OPERATORS
We are also used to some one-sided operators
in our previous life. For instance:
--, w.c ajuiwia nave DOtn a
one-sided meaning and a two-sided meaning; but,
thank goodness, they can be easily kept straight.
Here is a concrete example: the symbol T
or "ceiling." Used one-sided, the result of
operator \ applied to something numerical is the
integer just above the number it is applied to:
l 7 - 2 is 8. Used two-sided, the result is which¬
ever of the numbers it's between larger:
10 f 6 is 10. (There is also I , floor, which you
can surely figure out.)
Now, when you string things out into a long
APL expression, Iverson’s notation determines
exactly when an operator is one-sided and when
it is two-sided:
As you go from right to left,
another thing?) OP THING
another op? _
you generally start with a thing on the right. Then
comes an operator. If the next symbol is another
thing, then the operator is to be treated as a two-
sided operator (because it's between two things).
If the object beyond the first operator is another
operator, however, that means APL is supposed to
stop and carry out the first operator on a one-sided
basis. Example:
means the negation of 1;
means negating that .
APL can also nest one-sided operators.
Of
first operator is
applied to AT;
result is worked on
by second operator;
result is worked on
by third operator^
result is worked on by
fourth operator,
yielding final result.
Conclusion:
It's two-sided.
Interpretation:
"subtract B from A .
Conclusion:
The first operator
is one-sided.
Interpretation:
"negate B."
Then take next symbol.
A WCIRJ) EMMfce, T» HELP WITH TH£
Just for kicks, let us make up a notation
having nothing to do with computers, using these
Iverson principles:
1) If an operator or symbol is between two
names of things , carry it out two-sidedly.
If not, carry it out one-sidedly.
2) Go from right to left.
The best simple example I can think of involves
file cards on the table (named A, B, C...) and
operators looking like this:
90) A 90} B _—|
The notation is based on operators modifying
things . Let’s use alphabetic symbols for things
and play with pictures for a minute.
c*w
In considering the successive meanings of this
rebus we are proceeding from right to left, as
you note, and each new symbol adds meaning.
ThiB is the general idea.
You will note, in this example, the curious
arrangement whereby you can have several
pictures . or operators. in a row . This Is one
of the fun features of the language.
0) 45) 90) 180) 45) 907 180)
to which we may assign the following meanings:
ONE-SIDED: ROTATION OPERATORS
0) A do nothing to A
45) A rotate A clockwise 45*
90) A rotate A clockwise 90’
etc.
TWO-SIDED: STAPLING OPERATORS
B 45) A staple A (thing named on the right)
to B (thing named on the left)
at a position 45* clockwise from
middle of B’s centerline.
And equivalently for other angles.
Now, using these rules, and letting our things
be any file cards that are handy, here are some results:
457 A 90) 90) B /x
It’s hard to believe, but there you are. This
notation seems adequate to make a whole lot of
different stapled patterns.
Exercise ! Use this nutty file card notation
to program the making of funny patterns , Practice
with a friend and see if you can communicate
patterns through these programs, one person
uncomprehendingly carrying out the other s
program and being surprised .
The point of all this has been to show the
powerful but somewhat startling way that brief
scribbles in notations of this type can have all sorts
of results.
which is allowed to survive as is, because the moving finger
of the TRAC scanner does not re-scan the result .
It is left to the very curious to try to figure out why
this is needed.
y
Whatever can be executed
is replaced by
its result.
This may or may not
yield something
which is in turn
executable.
When nothing left is executable,
what's left
is printed out.
That's the TRAC language.
r
me® pf^mvfs*-
OUTPUT.
PS, string
PRINT STRING: prints out the second argument.
INPUT.
RS
READ STRING: this command is replaced by a string of
characters typed in by the user, whose end is signalled bv a
changeable "meta" character. y
CM, arg2
CHANGE META: first character of second argument becomes
RC new meta character. May be carriage-return code.
READ CHARACTER: this command is replaced by the next
character the user types in. Permits highly responsive inter¬
active systems.
DISK COMMANDS.
SB, blockname, forml, form2 ...
__ s TORE BLOCK: under block name supplied, stores forms listed
FB, blockname
FETCH BLOCK: contents of named block are quietly brought in
to forms storage from disk.
FAST ANSWERBACK IN TRAC LANGUAGE
TRAC Language can be used for fast answerback to
simple problems. Typing in Long executable TRAC expres¬
sions causes the result, if any, to be printed back out
immediately.
For naive users, however, the special advantage is in
how easily TRAC Language may be used to program fast
answerback environments of any kind.
A SERIOUS LANGUAGE; BUT BE WILLING
TO BELIEVE WHAT YOU SEE
TRAC Language,is, besides being an easy language to
learn, very powerful for text and storage applications.
Conventional computer people don't necessarily believe
or like It.
For instance, as a consultant I once had programmed,
in TRAC Language, a system for a certain intricate form
of business application. It worked. It ran. Anybody could
be taught to use it in five minutes. The client was consider¬
ing expanding it and installing a complete system. They
asked another consultant.
It couldn't be done in TRAC Language, said the other
consultant; that's some kind of a "university" language.
End of project.
HOW TO GET IT
There have been, until recently, certain difficulties
about getting access to a TRAC processor. Over the years,
Mooers has worked with his own processors in Cambridge.
Experimenters here and there have tried their hands at
programming it, with little compatibility in their results.
Mooers has worked with several large corporations, who said
said they wanted to try processors to assess the value of the
the language, but those endeavors brought nothing out to
the public.
FINALLY, however, TRAC Language service is pub-
lically available, in a fastidiously accurate processor and
with Mooers' blessing, on Computility™timesharing service.
They run PDP-10 service In the Boston-to-Washington
area. (From elsewhere you have to pay long distance. )
The charge should run $12 to $15 per hour in business hours,
Less elsewhen. But this depends to some extent on what
your program does, and is hence unpredictable. A licensed
TRAC Language processor may be obtained from Mooers
for your own favorite PDP-10. Processors for other com¬
puters, including minis, are in the planning stage.
TRAC Language is now nicely documented in two new
books by Mooers, a beginner’s manual and a standardization
book (see Bibliography).
Since Mooers operates a small business, and must
make a livelihood from it, he has adopted the standard
business techniques of service mark and copyright to
protect his interests. The service marie "TRAC" serves
to identify his product in the marketplace, and is an
assurance to the public that the product exactly meets the
published standards By law, the "TRAC" mark may not
be used on programs or products which do not come from
Rockford Research, Inc.
Following IBM, he Is using copyright to protect his
documentation and programs from copying and adaptation
without authority.
Mooers also stands ready to accommodate academic
students and experimenters who wish to try their hands at
programming a TRAC processor. An experimenter's
license for use of the copyright material may be obtained
for a few dollars, provided you do not intend to use tne
resulting programs commercially.
For information of all kinds, Including lists of latest
literature and application notes, contact:
Calvin N. Mooers
Rockford Research, Inc.
140-1/2 Mount Auburn Street
Cambridge, Mass. 02138 Tel. (617)876-6776
MAIN FORM COMMANDS.
DS, formname, contents
DEFINE STRING. Discussed in text.
CL, formname, plugl, plug2, plug3 ...
CALL: brings form from forms storage to working program.
Plugl Is fitted into every hole (segment gap) numbered 1,
plug2 into every hole numbered 2, and so on.
SS, formname, punchoutl, punchout2 ...
SEGMENT STRING: this command replaces every occurrence
of punchoutl with a hole (segment gap) numbered 1, and so on.
INTERNAL FORM COMMANDS.
(All of these use a little pointer, or form pointer , that marks a place
in the form. If there is no form remaining after the pointer, these
instructions act on their last argument, which is otherwise ignored.)
IN, formname, string, default
Looks for specified string IN the form, starting at pointer. If
not found, pointer unmoved. (NOTE: string search can also be
done nicely with the SS command.)
CC, formname, default
CALL CHARACTER: brings up next character in form, moves
pointer to after it.
CN, formname, no. of characters, default
CALL N: brings up next N characters, moves pointer to after
them.
CS, formname, default
CALL SEGMENT: brings up everything to next segment gap,
moves pointer to it.
CR, formname
CALL RESTORE: moves pointer back to beginning of form.
MANAGING FORMS STORAGE
LN, divider
LIST NAMES: replaced by all form names in forms storage,
with any divider between them. Divider is optional.
DD, namel, name2 ...
DELETE DEFINITION: destroys named forms in forms storage.
DA
DELETE ALL: gets rid of all forms in forms storage.
TEST COMMANDS.
EQ, firstthing, secondthing, ifso, ifnot
Tests if EQual: if firstthing is same as secondthing, what’s left
is ifso ; if not equal, what's left is ifnot .
GR, firstthing, secondthing, ifso, ifnot
Tests whether firstthing is numerically GReater than second¬
thing. If so, what's left is ifso ; if not, what's left is ifnot .
OH YEAH, ARITHMETIC.
(All these are handled in decimal arithmetic, a character at a time,
and defined only for two integers. Everything else you write your¬
self as a shorty program.)
AD
SU
ML
DI
}
mentioned In text.
BOOLEAN COMMANDS.
(Several exist in the language, but could not possibly be understood
from this writeup.)
♦ Description of TRAC language primitives adapted by permission from
"TRAC, A Procedure-Describing Language for the Reactive Typewriter, "
copyright ©1966 by Rockford Research, Inc.
BIBLIOGRAPHY
Calvin N. Mooers, The Beginner's Manual for TRACf Language,
300 pages, $10705", from Rockford Research, Inc.
(See "Where to Get It.") ~
Calvin N. Mooers, Definition and Standard for TRAC^T-64
Language, 86 pages7^5700, from Rockford Research, Inc.
Calvin N. Mooers, "TRAC, A Procedure-Describing Language
for the Reactive Typewriter," Communications of the ACM ,
v. 9, n. 3, pp. 215-219 (March 1966). Historlcpaper, out of
print. This paper is copyrighted, and the copyright Ls owned
by Rockford Research, Inc. , through legal assignment from
the Association for Computing Machinery, Inc.
And for those who want to understand the depth of the standardiza¬
tion problem, Mooers offers freebie reprints of:
Calvin N. Mooers, "Accommodating Standards and Identification
of Programming Languages," Communications of the ACM,
v.ll, n. 8, pp. 574-576 (August 1968).
{t >
an interpretive language
(each step carried out directly
by the processor without conversion
to another form first);
an extensible language
(you can add your own commands
for your own purposes);
a Ust-proceBsing language
(for handling complex and amorphous
forms of data that don't fit in boxes
and arrays).
It is one of the few such lan¬
guages that fits in little computers.
3. DRILLING THE HOLES
The holes (called by Mooers segment gaps ) are created
by the SEGMENT STRING instruction.
# (SS, formname, whateverl, whateve r2 ...)
where "formname" is the form you want to put holes in and
the whatevers are things you want to replace by holes.
Example: Suppose you have a form
i INSULT
YOU ARE A CREEP]
You make this more general by means of the SEGMENT
STRING instruction:
#(SS, INSULT, CREEP)
TEST COMMANDS IN TRAC LANGUAGE
There are test commands In TRAC Language, but like
everything else they work on strings of characters. Thus
they may work on numbers or text. Consider the EQ
command (test If equal):
#(EQ, ftrstthing, secondthlng, if so, ifnot)
where "firstthing" and "secondthlng" are the strings being
compared, and ifso and ifnot are the alternatives. If first¬
thing is the same as secondthlng, then ifso is what the
TRAC processor does, and ifnot is forgotten. Example:
#(EQ, 3, #(SU, 5, 2), HOORAY, NUTS)
If it turns out that 3 is equal to #(SU, 5, 2), which it is, then
all that would be left of the whole string would be
HOORAY
while otherwise the TRAC processor would produce NUTS.
To most computer people this looks completely inside-
out, with the thing to do next appearing at the center of the
test instruction. Others find this feature at-trac-tive.
DISK OPERATIONS
Now for the juicy disk operations. Storing things on *
disk can occur as an ordinary TRAC command.
#(SB, name,forml, form2,form3 ... )
creates a place out somewhere on disk with the name you
give it, and puts in it the forms you've specified. Example:
resulting in
#(SB, JUNK, TOM, DICK, HARRY)
[INSULT^ t ___
are A [ ]]
which can be filled in at a more appropriate time.
Fuller example. Suppose we type into the TRAC
processor the following:
#(DS, THINGY, ONE FOR THE MONEY AND TWO FOR THE SHOW)
#(SS, THINGY, ONE, TWO, )
- note space
We have now created a form THINGY and replaced parts of
it with segment gaps. Since each of the later arguments of
SEGMENT STRING specifies a differently numbered gap,
we will have gaps numbered [l], [2), and [3]. The gap [1]
will have replaced the word ONE, the gap [2] will have
replaced the word TWO, and a lot of gaps numbered [3] will
have replaced all the spaces in the form (since the fifth
argument of SS was a space). The resulting form is:
[thingy]
([II ^R[3rTHEt3]MONEY[3)ANDf3]T2jj3 ]F OR[3]THE[3]SHOW\
We can get it to print out interestingly by typing #(CL,
THINGY, RUN, HIDE) (since after the call, the plugged-in
form will still be in the forms storage.) This is printed:
RUNFORTHEMONEYANDHIDEFORTHESHOW
or perhaps, if we use a carriage return for the last
argument , we can get funny results. The call
#(THINGY, NOT A FIG, THAT,[carriage return]
should result in
NOT A FIG
FOR
THE
MONEY
AND
THAT
FOR
THE
SHOW
In TRAC Language, every command
is replaced by its result
“ the program's execution proceeds.
This is ingenious, weird and highly effective.
T * $ TAEU i H Ftevp
and they’re stored. If you want them later you say
#(FB, JUNK)
and they're back.
Because you can mix the disk operations in with every¬
thing else so nicely, you can chain programs and changing
environments with great ease to travel smoothly among
different systems, circumstances, setups.
Here is a stupid program that scans all Incoming text
for the word SHAZAM. If the word SHAZAM appears, it
clears out everything, calls a whole nother disk block, and
welcomes its new master. Otherwise nothing happens. If
you have access to a TRAC system (or really want to work
on it), vou may be able to figure it out. (RESTART must
be in the workspace to begin.)
j RE start | __
— /#(Ds7tEMP, #(RS))#(SS, TEMP, )#(RPT)|
#(EQ~SHAZAM, *(TEST), (#(EVENT)))#(RPT)] -
n (?(CS]TEMP, (* (RESTART)))]
IeventL ______—--a
(DA)#(FB, MARVEL)*(PS. WELCOME O MASTER)]
In this example, however, you may have noticed more
parentheses than you expected. Now for why.
PROTECTION AND ONE-SHOT
The last thing we'll talk about is the other two syntactic
layouts.
We’ve already told you about the main syntactic layout
of TRAC Language, which is
H )
It turns out that two more layouts are needed, which we may
call PROTECTION and ONE-SHOT. Protection is simply
( )
which prevents the execution of anything between the
parentheses. The TRAC processor strips off these plain
parentheses and moves on, leaving behind what was in
them but not having executed it. (But It may come back . )
An obvious use is to put around a program you're designing:
stripped stripped
but other uses turn up after you've experimented a little.
The last TRAC command arrangement looks like this
*H )
and you can put any command in it, except that its result
will only be carried one level
##{CL, ZOWIE, 3,4)
results in (using the forms we defined earlier).
19
the magic scan
The secret of combining TRAC commands la that
•very command, when executed, la replaced by Its answer ;
and whatever may result Is In him executed.
There la an exact procedure for this:
SCAN FROM LEFT TO RIGHT
UNTIL A RIGHT PARENTHESIS;
r—> RE SOLVE THE CONTENTS OF THE
I PAIRED COMMAND PARENTHESES
/ (execute and replace by the command’s result);
STARTING AT THE BEGINNING OF THE RESULT,
KEEP SCANNING LEFT-TO-RIGHT
[_ UNTIL A RIGHT PARENTHESIS. - j
WHEN YOU GET TO THE END, PRINT OUT
WHAT’S LEFT.
4H 'HUM(>/✓>*, fljeotrr sfcps ,*% a fUkt ioo%
ope* l*s f*r**thdf
& (powi)
IT'S SUP£KLW(HJA&£/
%
The beauty part la how it all works so good.
HELP; I AM TRAPPED IN A PROGRAM LOOP
An arithmetic example - bo you get the procedure.
#(AD,2,#(AD,3.4))
■-H
UJ
7
first right parenthesis
found.
execute what's In the
command parentheses
& replace
with their answer, leaving:
scan to next right parenthesis
execute L replace
find no more parentheses
print out what's left.
You might try this yourself on a longer example:
♦ (AD,*(SU, *{AD,3,4),*(SU,7,3)),1)
Here Is an Interesting case:
• (AD, 1)
There's no third argument to add to the 1 — but that’s
okay In TRAC Language. 1 it remains.
PULLING IN OTHER STUFF
The core memory available to the use Is divided Into
two areas, which we may call WORKSPACE and STANDBY.
The Standby area contains strings of characters with names.
Here could be some examples:
names strings
f HAROLD
\5432l]
llgg . HELP: I AM TRAPPED IN A LOOP)«(C4 PRO GRAM)]
[galoshes]
[I MUSTN’TF ORGET MY GALOSHES[]
There Is an Instruction that moves things from the
Standby area to the Workspace. This is the CALL
Instruction.
*(CL, whatever)
The CALL Instruction pulls In a copy of the named string
to replace It, the call Instruction, in the work area. The
string named In the call Instruction also stays In the Standby
area until you want to get rid of It. Example:
#(CL, HAROLD)
would be replaced by
54321
Suppose we say In a program
»(AD, 1, #{CL, HAROLD))
Then the result Is:
54322
Now let’s do a program loop using the CALL. If we
type In to our TRAC processor
*(CL, PROGRAM)
U should type
HELP; 1 AM TRAPPED IN A PROGRAM LOOP
HELP; I AM TRAPPED IN A PROGRAM LOOP
HELP; I AM TRAPPED IN A PROGRAM LOOP
so It prints that . If it had said
HELP, I AM TRAPPED IN A PROGRAM LOOP
the PRINT STRING command would only have printed
HELP
since a comma ends an argument In TRAC language.
Now, the PRINT STRING command leaves no result, so
It Is vaporized; all we have left In the work area is
»{CL, PROGRAM)
which is now scanned. But that’s another CALL, and when
It Is executed by fetching the object called PROGRAM, Its
replacement In the work area is
• (PS, HELP; I AM TRAPPED IN A PROGRAM LOOP)*(CL. PROGRAM)
and guess what. We done it again.
(Another example of TRAC Language’s consistency:
suppose it executes the command
*(CL, EBENEZER)
when there Is no string called EBENEZER. The result la
nothing; so that command disappears, leaving no residue. )
THE FORM COMMANDS
Let us be a little more precise. The Standby area
Is really called by Mooers "forms storage, " and a string-
with-name that ts kept there Is called a form. One reason
for this terminology 19 that these strings can consist of
programs or arrangements that we may wont to fit together
and combine. Thus they are "forms".
1. CREATING A FORM
To create a form, you use the DEFINE STRING
command:
#(DS, formname, contents)
The arguments used by DS give a name to the form and
specify what you want to have stored In it. Example:
#(DS, ELVIS, 1234)
creates a form named ELVIS with contents 1234.
(Note that to get a program into a form without Its being
executed on the way requires some preparation. For this,
"protection” is used; see end of article.)
It turns out that DEFINE STRING Is the closest TRAC
Language has to an assignment statement (as in BASIC,
LET A = WHATEVER). If you want to use a variable A,
say, to Store the current result of something, In TRAC
Language you create a form named A.
•CDS, A, WHATEVER)
Whenever the value of A Is changed, you redefine form A.
2. CALLING A FORM.
As noted already,
• (CL, ELVIS)
will then be replaced by
1234
But a wonderful extension of this, that hasn't been
mentioned yet, Is
2A. THE IMPLICIT CALL.
You don’t even have to say CL to call a form. If the
first argument of a command — that Is, the first string
Inside the command parentheses - ts not a command known
to TRAC Language, why, the TRAC processor concludes
that the first argument may be the name of a form. So now
If you type
Indefinitely.
Why Is this? Let’s go through the steps.
We noted that tn our Standby area we had a string
named PROGRAM which consisted of
#CP8, HELP; I AM TRAPPED IN A PROGRAM LOOP)#(CL. PROG
The TRAC processor scans across It to the first right parenthesf
»(P8, HELP; 1 AM TR APPED IN A PR OGRAM lo op )«(CL, PROG
and now executes this. ~~ ~ ^
PRInVstr*™^*! PS “ th * PFUNT STRING instruction.
th™L ? ° Ut "* * eCOnd ar K um '"'. forgets
me rut. But the oaty argument after PS Im
#(AD, *CHAROLD>, #(ELViS))
w
It will first note, on reaching the rlght-paren of the
HAROLD command, that since HAROLD Is 54321, you
evidently wanted this:
#(AD, 54321, f (ELVIS))
rescan of result
and then will do the same with ELVIS:
*<AD, 54321,1234)
so that pretty soon it'll type for you
This language is marvelously suited to date base management,
management information systems, interactive query systems,
•nd the broad spectrum of "business'' programming.
For large-scsle scientific number crunching, not so good.
With one exception: "Infinite precision" srithmctic. when
people want things to hundreds of decimal places.
Chugga chugg*.
This implicit call Is the trick that allows people to create
their own languages very quickly. In not very tong, you could
create your own commands - say ZAPP,MELVIN and some
more; and while at first It Is more convenient to type In the
TRAC format
•(ZAPP, * (MELVIN))
it Is very little trouble in TRAC Language to create new
syntaxes of your own Uke
ZAPP ! MELVIN
that are Interpreted by the TRAC processor as meaning the
same thing.
2B. FILLING IN HOLES.
Another thing the CALL command in TRAC Language
does is fill in holes that exist In (orms. Let us represent
a hole as follows;
[ I
Now suppose there is a TRAC form with a hole in it, Uke
this.
S 0 RD -N« [tJ
Additional arguments in the call get plugged into holes In
the form . Examples:
call result
•(CL, WORD) HT
• (CL, WORD, 0) HOT
•{WORD, A) HAT
•(WORD, OO) HOOT
Now, a form can have a number of different holes.
Let us denote these by
|1][2)(3| |4j ...
Now suppose we have a form
which we might call numerous ways:
call result
• (WORD, W,1,E) WHITE
• (WORD, ,0O, OWL) HOOTOWL
(Note that putting nothing between two
commas made nothing the argument.)
•(WORD, *(WORD, ,OS.O) HOTSHOT
Perhaps you can think of other examples.
This fill-in technique is obviously useful for program¬
ming. [f a form contains a program, its holes can be made
to accept varying numbers, form names, text strings,
other programs. Example: Suppose we want to create a
new TRAC command, ADD, that adds three numbers instead
of just two. Fair enough:
*(AO,[2],[3]))|
and there you are.
This brings up another example of how nicely TRAC
Language works out. Suppose you have the following In
forms storage:
4ZIPJij,(4)]
•( ZAP, ( 1), [2])]
Try acting this one out with pencil and paper. Suppose you
type In
• (Z0W1E, 5,7)
It happens that the arguments 5 and 7 will be passed neatly
from ZOWIE to ZIP to ZAP to the final execution of the AD;
all through the smooth plugging of holes by the Implicit call
and the Magic Scan procedure of the TRAC processor.
...
TMC Language is a so-called "list processing language" or
"List Language." This Cera has aae to soon any longuaga
for twiddling data having arbitrary and changing fora.
TWo other prowlnant languages of this type are SWOBOL and
LISP (see p. Jl>.
55555
List languages
illy freaky.
tHE SLUFIHCr 6l*Nr
A mild-mannered man in Cambridge, Massachusetts,
who owns his own very small business, is the creator of one
of the most extraordinary and powerful computer languages
there is, though lots of people in the field don’t realize it.
The language is fairly well-known among professionals, but
its real power is hardly suspected.
If BASIC is a fairly conventional programming language,
strongly resembling FORTRAN, TRAC (Text Reckoning and
Compiling) Language is fairly unusual.
The name of it is "TRAC Language , " not just TRAC —
because it’s a registered brand name (like Kleenex Tissues ).
Within the rules, the word "TRAC" is an adjective and not a
noun. Thus TRAC is its first name, Language is its last; so
we can refer to "TRAC Language" instead of having to
precede it with the .
It is included here for several reasons.
1) It is extremely easy to learn, at least for beginners .
Experienced programmers often have trouble with it.
2) It is extremely powerful for non-numeric tasks. In
fact, it is ideal for building your own personal language.
3) It offers perhaps the best control of mass storage,
and your own style of input-output, of any language.
4) It is superbly documented and explained with the new
"The Beginner's Manual for TRAC Language)’ which is now
available.
5) It is likely to catch on one of these days. (Some
large corporations have been investigating it extensively.)
It is not so much the basic idea
of TRAC Language, but the neatness
with which the idea has been elaborated,
that is so nice.
As a side point, here is an
important motto for thinking in general
about computers (and about other things
in general):
MAKING THINGS FIT TOGETHER WELL
TAKES A LOT OF WORK AND THOUGHT.
Let Calvin Mooers 1 TRAC Language be a
shining example.
TRAC Language is great for creating highly interactive
systems for special purposes, including turnkey systems for
inexperienced users and "good-guy" systems. It combines
this with good facilities for handling text, and what is needed
along with that, terrific control over mass storage. It is
also excellent for simulating complex on-off systems; rumor
has It that TRAC Language was used for simulating a major
computer before it was built.
Against these advantages we must balance TRAC
Language's less fortunate characteristics. For numerical
operations it is extremely slow, if not terrible, compared to
the most popular languages. The same applies to handling
numerical arrays and controlling loops, which are compara¬
tively awkward in TRAC Language.
Finally, many programmers are incensed by the
number of parentheses that turn up in TRAC programs; in
this it resembles the language LISP. But this is an aesthetic
judgement.
The TRAC Language has been thought out in great
detail for total compatibility of all parts. (Moreover, by
standardizing the language exactly, Mooers heroically
assures that programs can be moved from computer to
computer without difficulty.)
* TRAC is a registered service mark of Rockford Research,
Inc. Description of TRAC Language primitives adapted by
permission from "TRAC, A Procedure-Describing Language
for the Reactive Typewriter", copyright © 1966 by Rockford
Research, Lnc.
I am grateful to C.A.R. Kagan, of Western Electric
Engineering Research Center, for his extensive
(and finally successful) efforts to interest me in
TRAC Language.
In the well-thought-out ramifications of its basic concept,
the TRAC Language is so elegant as to constitute a work of
art. It beautifully fulfills this rule:
. . the facilities provided by the language should be
constructed from as few basic ideas as possible, and
... these should be general-purpose and interrelated
in the language in a way which avoided special cases
wherever possible.” (Harrison, Data-Structures and
Programming, pub. Scott, Foresman, p. 251.)
The fundamental idea of TRAC Language, which has
been worked out in detail with the deepest care, thought and
consistency, is this:
ALL IS TEXT.
That is, all programs and data are stored as strings of
characters, in the same manner. They are labelled, stored,
retrieved, and otherwise treated in the same way, as
strings of text characters.
Data and programs are not kept in binary form, but
remain stored in character form, much the way they were
originally put in. The programs are examined for execution
as text strings, and they call data in the form of text strings.
This gives rise to certain interesting kinds of
compatibility.
a) Complete compatibility exists in the command
structure: the results of one command can become another
command or can become data for another command.
ALMOST NOTHING CREATES AN ERROR CONDITION.
If enough information is not supplied to execute a command,
the command is ignored. If too much information is supplied,
the extra is ignored.
b) Complete compatibility exists in the data: letters and
numbers and spaces may be freely intermixed. Special
terminal characters (like carriage returns and backspaces)
are handled just like other characters, giving the program¬
mer complete control of the arrangement of output on the
page.
c) Complete compatibility also exists from one computer
to another, so that work on one computer can be moved to
another with ease. By the trademark TRAC, Mooers
guarantees it — an innovation.
COMMAND FORMAT
A TRAC command has the following form. The cross-
hatch or sharp-sign is the way this language identifies a
command's beginning.
#(NM, arg2, arg3, arg4,..)
NM is the name of any TRAC command. It counts as the
first "argument, ” or piece of information supplied. Arg2,
arg3, etc. are whatever else the command needs to know to
be carried out.
We will look first at examples that use the arithmetic
commands of TRAC Language, not because it is particularly
good at arithmetic, which it isn’t, but because they're the
simplest commands. The arithmetic commands are AD
(add), SU (subtract, ML (multiply), DV (divide). Each
arithmetic command takes three arguments, the command
name and two numbers. Examples:
#(AD, 1,2)
is a command to add the numbers 1 and 2.
#(SU, 4,3)
is a command to subtract the number 3 from the number 4.
#(ML,632, 521)
is a command to multiply 632 by 521.
#(DV, 100,10)
is a command to divide 100 by 10.
Now comes the Interesting part.
The way TRAC commands may be combined provides
the language's extraordinary power. This is based on the
way that the TRAC processor examines the program, which
is a string of character codes. Watch as we combine two
AD instructions:
#(AD,3,#(AD, 2,5))
The answer is 10. Miraculous !
How can this be?
^ A comma ends an argument
in the TRAC language?
Ah, that all arguments
could be ended so easily.
--My grandfather.
PRINT "HOW OLD ARE YOU"
INPUT A
LET B = A/40.0
PRINT "YOUR AGE IS" . B. "TIMES THE AGE
OF THE EMPIRE STATE BUILDING."
END
This will cause the following lo happen:
Program type*:
HOW OLD ARE YOU? 20
ns—
Program types:
YOUR AGE IS .5 TIMES THE AGE OF THE EMPIRE
STATE BUILDING.
The IF command
The IF command is a way of testing what's stored
In a variable. Example:
88 IF M = 40 then 63
This tesla variable M to see if it contains the number 40.
If M is indeed 40, the program follower jumps to line 63.
If not. it goes right on and takes the next higher instruction
after 88. The IF can test other relations than equality.
Including "less that." "greater than," "not equal," "less
than or equal to." etc. For instance,
89 IF Q 7 then 102
will send the program follower to command 75 if variable
Q contains a number less than 7. {Note that different BASICa
for different computers may have slightly different rules
here.)
The BASIC language, developed at Dartmouth, must not be
confused with the underlying binary languages of individual
computers (see "Rock Bottom," p.3Z). These underlying
codes sre called "machine languages” (or, in a dressed-up
form, easier to use for programmers, "assembler language").
These are the basic languages, different for each machine.
Dartmouth BASIC, or jut plain Basic, is a widely available,
standardized, simple beginner's language.
ANOTHER PROFOUND EXEMPLARY PROGRAM
r - - - 62
; 63
*—-* 74
75
The program will start typing thusly:
25 BOTTLES OF BEER IN THE WALL
24 BOTTLES OF BEER IN THE WALL
and so on. until Z has reached 0; then it will type
0 BOTTLES OF BEER IN THE WALL
TIME TO GO HOME .
and then it will stop.
You will note that this program, like the one that
printed "HELP. 1 AM CAUGHT IN A LOOP." has a loop,
that ia, a repeated sequence of operations. The first one
was an endless loop, which repeated forever. This loop,
however, is more well-behaved (by some people's standards),
In that it allows an escape when a certain criterion has
been reached- - in this case, printing a line of text 25 times
with variants.
The reason we are able to escape from this loop is
that we have a test instruction, IF statement number 62.
It ia very important for the programmer to Include
testa which allow the program to get out of a loop. This
may be couched as a motto, viz.:
LEAK BEFORE YOU LOOP.
LET Z = 25
PRINT Z. " BOTTLES OF BEER IN THE WALL"
LET Z = Z - 1
IF Z = 0 GOTO 74
GOTO 10 - . . . .—-
PRINT "TIME TO GO HOME ."
END
0
AN AUTOMATIC LOOP
Indeed, for people who are big on program loops,
BASIC provide# a pair of instructions which handle the
program loop completely. These are the FOR and NEXT
instructions. Wc won't show them here, but they're not
very hard. Using the FOR command , you can easily direct
the computer to do something a million and one times, say.
This can be exhilarating. You can even direct it lo include
that program in something to be done a billion timea, resulting
in a program loop that would be carried out over a trillion
times. All In a abort program! But of course this ia juat
power on paper: we want our program# lo be useful, and
rinlah their Job# in the present century, and ao such flight*
are juat mental exercise#.
FAST ANSWERBACK WITH BASIC (in some version#)
If you want a fast answer to a numerical question,
you can do It without the line number#. typing in
PRINT 3.1416*7124
will cause BASIC to print the answer right out and forget
the whole thing.
TEXT STRINOS IN BASIC
The deluxe veralona of the Dartmouth BASIC
language have operation# for handling lext--
or what computerfolk call "string#," that is.
strings of alphabetic characters and punctuation.
Theae operation# tend lo begin with $ (standing
for "Itrlng"?) and there's no room for them here.
But what they mean is that BASIC can type
letter#, count the noun# In Gone With The Wind ,
or print out the nine hundred million name# of
God.
THIS IS A SERIOUS LANGUAGE,
AND CAN SAVE SOME COMPANIES A LOT OF MONEY
BASIC 1# a very serious language. Advanced versions
of BASIC have Instructions that allow users to put in alphabetical
Information. and store and retrieve all kind# of Information
from disks or tape. In other words, BASIC can be used
for the fairly Bimple programming of a vast range of problems
and "good-guy syatems" mentioned elsewhere. Complete
BASIC systems allowing complex calculations can be had
for perhaps $3000: a general-purpose computer running
BASIC with cassette or other mass storage, for business
or other purposes, can now be had for some $6000. Allowing
a few thousand dollars for programming specific applications
in BASIC, simple systems can be created for a variety
of purposes that some companies might say you needed
a hundred-thousand-dollar system for.
This is serious business. Languages like BASIC
must be considered by people who wont simple syatems
to do understandable things in direct ways that are meaningful
to them, and that don’t disrupt their companies or their
lives.
This has been a very hasty and brief presentation
in which I have tried to convey the feeling of this important
language. If you have the chance to learn it. by all means
do.
SOME FUN THINGS TO TRY IN BASIC
Write a program that prints calendars.
Write a program that converts an input number to
Roman Numerals.
Write a dialogue system that welcomes the user to
the sanitarium, asks him questions, ignores the answers
and insults him. (Use the INPUT statement for receiving
numerical answers. Since the answers are ignored they
can all be stored in one variable.)
WHERE TO GET IT
(Features of the BASIC language vary considerably
from system to system. Which ones offer the highly desirable
alphabetic commands and mass storage have to be checked
out individually.)
BASIC is offered on many if not most time sharing services,
so you can use it from your home on a terminal. (But note that
lhi9 can be expensive and even dangerous, if you’re paying
yourself; there arc not presently adequate cost safeguards lo
prevent you from running up huge bills.)
BEST BUY? Rumors persist of a time-sharing service
somewhere thBt offers BASIC for $S an hour, total, with disk
storage thrown in. I have not been able to verify this.
DEC offers minicomputer-based systems which time-
share BASIC among several terminals simultaneously. (But
you have to buy the whole big system .) The ones that
run on the PDP-8 are marketed mainly to schools, and for
this reason are called, somewhat peculiarly. EDUSYSTEMS
Their multiterminal system for the PDP-11 is called RSTS
(pronounced "Risstias,") and is marketed mainly to businesses.
Hewlett-Packard offers BASIC, 1 believe, on all of
its minicomputers. Of special interest is an odd computer
called the Series 9800 Model 30. You’re only allowed to
program in BASIC. Ofs actually a microprocessor; see
p.ii>
Many other minicomputer manufacturers now offer
BASIC . Data General's NOVA is one.
BIBLIOGRAPHY
Kemeny and Kurtz, BASIC Programming . Wiley, 1967.
DEC'a Edusystem Handbook is a very nice introduction
to BASIC, quite pleasant end whimsical; it may be
a good introduction even if you're using other people's
BASIC systems. It's $5 from DEC, Communications
Services, Parker St., Maynard, M#ss. 01754.
There is also a programmed text on BASIC by Albrecht
(published by Wiley). For those of ua who freeze
at numerical-looking manuals, programmed texts
can take away a lot of anxiety .
MY COMPUTER LIKES ME (when I speak in BASIC ).
This book has evidently been pul together by the People's
Computer Company . and has some idealistic fervor behind it.
$1.19 from Dymax, Box 310. Menlo Park, Cal. 94025.
17
AtWS,
(available in BASIC , APL and many other languages)
Arrays are Information setups with numbered
positions. The positions can contain #11 sorts of
different things, however: numbers, letters or
other data, depending on the data structures
allowed in the language.
f *z 5 9 r
• --
rrn
KT
T*&e-J>IK*MnDAlH WXAY
A one-dimensional array is like a row , a two-
dimensional array is like a tabletop, a three-
dimensional array is like a box. and for more
dimensions you can’t visualize.
Arrays are handy for working with a lot of
different things one at a time. They can be given
names just like variables.
Suppose you have a one-dimensional array
named SAM. Then in a program you can usually
ssk for the third element in SAM by referring to
SAM (3). Better than that; you can refer by turns
to every element of SAM by using a counting
variable and changing its value. SAM (JOE) can be
any one of the elements of the array, if we set the
value of JOE. the counting variable, to the number
of the position we want to point to.
For arrays having more than one dimension,
the principle is the same. You may refer in a
program to any space in the array by giving a
number in parentheses, or subscript, specifying
the space's position in each dimension. Suppose
you have an array named PRICES, which gives
the prices of, ssy, various sizes and brands of
TV sets.
-217
„_
_
Mfr. Mfr. Mfr. Mfr Mfr.
This is PRICES(3,2)
because it's the item in row 3, column 2
9" diag.
12"
15"
19"
^ 'fs
BASIC is a good example of an "algebraic" type of
language, that ia. one formulated more or
less to look like high-school algebra and
permit easy convoraton of certain algebraic
formula# into actual runnable programs.
The most widoly-u#ed language of this type is
FORTRAN (see p.31 ). Thus BASIC i*
often referred to as a "Fortran-type language "
The kickeroo-- and if you understand this it's half
the battle - Is that a line of BASIC or FORTRAN
direct# a certain event to take place, while
■ statement In algebra juat describe# relation#.
The strange resemblance between the descriptive
language (algebra) and the prescriptive
language (Fortran or Basic) i* that algebraic
operation# (which are just recombination#
and restatement#) can be mimicked by the
computer language, and ibis e#rly ob#e##lon
of mathy computerfolk led to making the
computer language look like a descriptive
algebra. Especially with the weird u#e of
the equals-sign to mean "is replaced now by."
In hindsight this wa# a ridiculous idea;
some of the more recent languages (Such a#
APL) ua* a left-pointing arrow instead of an
equala-algn, showing that an action t* being
called for, rather than a relationship being
described.
Suppose you have a two-dimensional array
giving the telephone numbers, salaries and ages
of several different employee# of ■ company. You
have decided to call the array WHAM.
Tel.no. [
Salary /
1
Age [
_
You can refer to any single entry in this array a#
WHAM UR V , JOE), where IRV and JOE are two
counting variable* you've decided to set up.
If you set IRV and JOE both to 1.
WHAM (IRV .JOE) is really WHAM(l.l). which
refers you to the telephone number of employee A.
If you change JOE to 2, that give# you WHAM (1.1).
giving you B'. phone; while WHAM(2.1) would be
A'e salary'
Theae are just the mechanics. What you
choose to do with this sort of thing t# your own
affair. Counting around in array# (and core
memory, where they're atored) 1* called Indexing-
If you write the program.
Y*> 0 * Fltsr tOKFUTCR UN6UMC:
PMITaovtM‘5
The BASIC language, also called Dartmouth-Basic,
was Introduced in the sixties at Dartmouth College by John
Ketneny and Thomas Kurtz. It was intended to be a simple
and easy-to-learn introduction to computer programming,
yet powerful enough to do useful things. It has grown in
use , in recent years, both as the foremost beginner's language,
and as a perfectly fine language for doing many simple
Kinds of work— like custom business applications, statistics,
and "good-guy" systems for noi. 2 users as discussed elsewhere
in this book.
Kemeny is now president of Dartmouth, and Kurtz
runs their high-power time-sharing computer center, so
BASIC has a permanent home base there.
Note that the name BASIC does not refer to the bottom-
level or elemental languages of computers. BASIC has
been contrived specifically to make programming quicker
and easier. It iB not "basic" to all computers; such bottom
languages are called "machine language" or "assembler
language" (see pp.
The simplicity of the language begins at the program
input, or editing, level. Each command of BASIC must
be on a separate line, and each line must have a separate
line number. Suppose you accidentally type in
50 IMPUGN Y
when you meant "INPUT" instead of "IMPUGN." You may
replace that command at any time by typing the same line
number and the new version of the line,
50 INPUT Y
which automatically replaces the previously line 50. If
you went to get rid of the line entirely, you type
50
When you type In a program, the BASIC processor
will do certain things to it (actually cook it down) and store
it in core memory:
Every time you change one of the lines of the program the
BASIC processor will insert, delete or replace lines as
you have commanded, then rearrange whatever'a left accordingly.
In order of the line numbers.
Then when you tell the processor to start the program,
by typing (with no line number)
RUN
The END command
The END command in BASIC simply consists of the
word END. It must come last in the program . Therefore
It must have the highest line number. Example;
90 END
The PRINT command
Whenever the program follower geta to a PRINT command.
it prints out on the terminal whatever la specified. Example;
97 PRINT "HAIL CAESAR . BIRD THOU NEVER WERT"
When and if the program follower geta to this command,
the terminal will print out
HAIL CAESAR. BIRD THOU NEVER WERT
The GOTO commend (pronounced "Go 2")
The GOTO command tells the program follower the
number of the next command for it to do, from which It
will go on. Example:
62 GOTO 99
the processor will start the program going at the command
with the earliest line number, and your instructions will
be executed according to the rules of BASIC.
which means that when a program follower gets to command
#62, it must next Jump to 99 and go on from there, unless
that happens to be the END statement.
Now we will consider some of the commands (or statements)
of BASIC.
——
A SIMPLE SAMPLE PROGRAM
These are enough commands to write a sample program.
43 PRINT "HELP , I AM CAUGHT IN A LOOP"
67 GOTO 43
68 END
The program will start at the first instruction, which
happens in this case to be instruction number 43. That
one prims a message. The next command, by line number,
is 67. This tells the program follower to go back to 43,
which it does.
43
67
68
PRINT
GOTO
END
"HELP, I AM CAUGHT IN A LOOP"
43-
n
These two boys had never seen a computer before,
but 1 loaded it up with the BASIC language processor,
showed them a few basic commands and told them to
turn it off when they were through.
1 got back ten hours later and they were still at it.
Too bad kids hove such short attention spans.
■\—v
VARIABLES
The result is that your terminal will print
HELP, I AM CAUGHT IN A LOOP
HELP, I AM CAUGHT IN A LOOP
HELP , I AM CAUGHT IN A LOOP
Interminably. or until you do something drastic. It never
gets to the END statement. (Two strategies for doing something
drastic ere usually to hold down the CONTROL button and
type C, or hold down both CONTROL and SHIFT buttons,
if you have them, and type P. One of these usually works.)
and an end-of-line code, and the whole line is gone.
Example of a BASIC command:
153 LET X = Y
You can choose any line number* you want, but the lines
are automatically put in the order of their numbers. Since
when you write a program you don't usually know at the
outBet what it will look like later, you try to leave enough
gaps in the numbers at the start to fit in the instructions
you might want to put between them later.
The BASIC language, like a number of other languages,
allows you to set aside places in core memory and give
them names. These places may hold numbers. They can
be used to count the number of times that things are done
(or not done), to hold answers, numbers to test against,
numbers to multiply by and so on.
In BASIC, these places are given names of one alphabeti¬
cal letter. That means you can have up to 26 of them.
Examples;
A E 1 O U sometimes Y even X
THE SETTING
To begin with, there must be a computer, and it
muat have a processor for the BASIC language, that is,
a program for carrying out the operations of Dartmouth-
BAS1C. We will assume that thl* BASIC processor la all
set up in core memory ready to go.
(Note; Thla is how it looks ■
in a minicomputer. On
a time-sharing system there’s
a lot of irrelevant other
stuff going on. which we’ll
leave out.)
Because theBe named spaces in memory may be used
something like the way letters are used in algebra, we
call them variables . In fact. each one is s place with a
name.
(—0
Ol
AcT«* l V*
151 1052 -LiW.)
If you uee the names B ,C and D for variables in your
program, the BASIC processor will automatically set up
places for them to be stored.
And we will assume. as previously mentioned, that you
have some Idnd of a terminal-- that ia, a device with a keyboard,
some kind of place the computer can send messages to you
and vice versa , and is more or less standard.
Now then: all that is needed is for you to understand
the BASIC language, and you can program this computer
within the confines of BASIC.
it is one of the strange aspects of this field that
languages can be taught independently of discussions of
the machine itself.
The LET command
The LET command puts something into a variable.
Example:
43 LET R= 2.3
What is on the right side of the equals sign in the last statement,
in this case 2.3, is Btuffed into whatever location of core
memory is designated on the left side, in this case a place
known to you only as R. With the result that someplace
in core memory ia ___
The LET statement ia an example of an assignment statement,
which most computer languages have; an assignment statement
assigns a specific piece of information (often a number,
but often other things) to some name (often standing for
a particular place in core memory).
The LET command in BASIC can also be used to do
arithmetic. Example:
14 LET M = 2.3 + (12*7999.1)
(The asterisk has to be used for multiplication because
traditionally terminals don’t have a times-sign.) BASIC
will work this out from right to left and store the result
in M.
The INPUT command
The INPUT statement asks the person at the terminal
for a number and then shoves it into a variable. Example:
41 INPUT Z
which causes the terminal to type a question mark, and
wait. When the user has typed in a number followed by
a carriage return, the BASIC processor stuff* the number
into the variable and proceeds with the program. Here
ia a program using the INPUT statement.
art what make computer* go 'round.
H your computer only did one thing,
then to start It you’d only need one button to
If your computer only did two doien
things, without variations, then you could
let each operation be started by pressing
one of the keys of the terminal, and that
would be that.
But that's not what it'a about.
We have lota of different things that we
want computer a to do, and we want one com¬
mand to work on different varieties of dats. or
on the resulta of a previous command, or even
to chew on another command itself; and so a
computer language is a contrived method of
giving commands to a computer that allows
the commands to be entwined in a complex fashion .
This means having rules the computer can
carry out and the person can remember.
Thia means having basic operations that
can be built into bigger operations (routines,
subroutines, subprograms. programs).
Thus a computer language is really
a method by which a user can tie these
programs together. Computer languages
are built according to contrived sets of
rules for tying programs together. Such
rules are limited only by the imagina¬
tion of their contrivers. Each computer
language has its own contrived system of
rules, and it may be completely different
from the contrived rules tying together
any other computer language. (That's one
reason for here presenting three differ¬
ent computer languages, to show some of
the mad variety that can exist.)
Computer languages tend to look like
nothing else you've ever seen. Thus com¬
puter programs, which of course have to
be written in these computer languages,
look pretty weird. Some programs look
like old train schedules (in multiple
columns). Some look a little like prin¬
ted poetry. In any case, a COMPUTER PRO¬
GRAM NO MORE LOOKS LIKE ITS RESULT THAN
THAN THE WORD "COW" LOOKS LIKE A COW.
One of the central concepts of this
book is that of a' "program follower," a
dynamic entity which somehow follows a
program. Well, EVERY LANGUAGE HAS A PRO¬
GRAM FOLLOWER FOLLOWING ITS OWN PARTI¬
CULAR RULES. These rules are contrived
for convenience, suitability to a purpose,
and "aesthetics" of a sort-- often some
form of stark compression. (The program
followers wired into computers are some
what more akin to one another; see "Rock
Bottom," p. 32.) About all we can say
languages have in common is: EVERY COM¬
PUTER LANGUAGE ALLOWS LOOPS, TESTS AND
BRANCHES, AND COMMUNICATION WITH EXTERNAL
DEVICES, as mentioned on p. 11. Beyond
that the differences are incredible.
ThI^cId
f OK Voor
Everyone should hove some brush with
computer programming, just to see what it in
and isn't. What H is: casting mystical spells
in arcane terminology , whose exact details
have exact ramifications. What it i sn't : talking
or typing to the computer in some way that re¬
quires intelligence by the machine What d is:
an intricate technical art. What d isn't : science.
Why three languages ’! Because one would
look too much alike. Only by perusing several
do you get any sense of the variety they take.
These three languages make it possible
in principle for you to learn computers
with no coaching. All you need (in princi¬
ple) is your own terminal, and time-sharing
accounts with firms running BASIE (most of
them do), TRAC Language (for availability
see p. 21), and/or API. (for partial list of
sources see p. 25),
Why these three? Several good reasons.
One. they can be used from a terminal , which
means that you could in principle get a terminal
in your home and play with the computer from
over the telephone. But this is expensive,
and at worst fraught with accidental financial
liabilities, so the possibility is minor right now.
Nevertheless, it should be practical and inex¬
pensive fairly soon.
These languages have been chosen be¬
cause they arc important, very different
from each other very powerful, influential
and highly regarded in the field, interac¬
tive from tine-sharing systems, arid very
suitable for making interactive programs
and "good-guy systems."
Each may be used to create programs
for science, business or recreation.*
Because Che-:,
from a terminal,
we night call i■
can be used
trued quickly,
..'tguages.
Note: inter i 1 ; inges mean vou,
the programmer, can change your progran
from the terminal; interactive programs
are those which interact with users, which
is different. However, these languages arc
quite suitable for both.
Another reason for these three: they
represent, in a way. several major types.
BASIC is a widespread and fairly standard
language- that is, it i s available on computers
everywhere. Moreover, it looks rather like
Fortran, which is the most important “scientific"
computer language.
TRAC Language, though well-known among
researchers, has mighty powers that are not so
well known. Moreover, it achieves its powers
through the simple and highly consistent following
of a few simple principles. and is thus both very
easy to learn and an elegant intellectual triumph
for its inventor.
Moreover, it is a so-called "list language,”
meaning that it can handle information having
extremely varied and changing form-- a very
important feature to those of us interested in
computer applications like picture-making and
text handling, which use amorphous and busy
types of dota. (See "Data Structures." pp_2G )
APL is another elegant language, also
worked out handsomely from certain basic ideas
by a very thoughtful and inspired inventor.
In the contemplation of these three lan¬
guages you may begin to see the influence of
the individual human mind in the computer field,
quite contrary to the stereotype. I would like
to stress here that each of these three languages
represents somebody's individual personal ach¬
ievement. and ia in turn a foundation upon
which others, writing programs, can build
Two of these language* n-.-rni:
creation of interactive -
on a line-by-line basi ■: ;
Language (pp. 18-21) p._.-
of systems that react :
user types in, rather th-u. •„ i,:- m
carriage return at the end of a ii
permits you to program user-level
that are even more responsive.
• work
TRAC
’ i on
■ the
• or the
ine. This
IF YOU'RE SCARED. Don't worry, it's
not a test. Flip the pages and look at the exam¬
ples. (In particular, you might look for the
same program which appears in each language:
a program to cause the computer to print
"HELP. I AM TRAPPED IN A LOOP” forever.)
This book is organized so you can look
at it or skip it in any order, so there is no
particular reason you have to fight through
the next three chapters if you went to press on
But if you want to study these languages, by all
means do so.
Languages that can be used from a terminal
tire called on-line languages . There are u num¬
ber of other popular on-line languages: JOSS
(the original). FOCAL. LOGO. SPEAKEASY I'm
just sorry there's no room for them here.
Some popular non-interactive languages
arc briefly described on pp. 30-31.
And you Just ir. ,tuti.
TUI more and nor.- you get the feel of tt.
And find yourself writing programs that
THE BC ST HAY to CEARU.
tHfurot lexT 0>itoes"
The Moving Finger writes; and, having writ.
Mom on: nor all your Piely nor Wit
Shall lure it back to cancel hah a Line,
Nor all your Tear* w«»h out a Word of il.
Khayyan/Pitagefa Id
Numerous interactive programs exist for
editing text at computer terminals-, in other
words, for doing what Magic Typewriters do, but
using a computer instead of a small special-
purpose machine.
Unfortunately most of tiiese systems are
dreadful. Dreadful, that is, for ordinary
human beings. What computer people seem to
think of as appropriate systems for handling
text are totally unsuitable for people who care
and think a lot about text, although they nay
be good for computer programmers.
Such systems allow you to insert text
(with some difficulty), delete (with some dif¬
ficulty), and rearrange (maybe).
Ordinarily the user must learn an explicit
command language, some system of alphabetical
commands that have to be typed In to effect any
change in o ,1. Programmers think this
** ighens the mind.
The text i* uN-i.il l y turcvi .i.i series of
alphabetical and pimctu;it ion codes in the com¬
puter's core memory. The area it occupies in
the core memory is called a core buffer .
The program generally gives the user an im¬
aginary "pointer," a marker specifying what point
in the text the program is currently concerned
wi th.
What is the pointer for ” It specifies where
the operations are to take place. "Insert," for
example. if text is inserted, it will go into
the place presently pointed at.
Many of the commands are concerned witli con¬
trolling the current position of the pointer,
moving it backward or forward by a specific num¬
ber of characters (including punctuation marks
and spaces) or lines (known to the program by the
carriage-return codes interspersed in the text).
behave and
personal quirks oi who ;
Another feature mar-.
Ccf\pUTCy<~2yvie tot syrrei^.
4 ifoi cr *
: , ,A '
o ° ° p J
* c 7 fc ' D i-
-2-L' c t T H f f A *' ' *' ■ *
£MT7£ rJjcK-x
a speci-
, the next
ind prop-
, e with
. .Me
• , • fie forced
u.gouges because
nought processes
, if not make
14
TWO
You would think the fundamental dichotomy
among computer terminal* was between those that
print on paper and those that show you stuff on
a screen. Butttian’t. (That’s like the difference
between people and whale*-- much greater outside
than inside.)
Actually the fundamental distinction between
terminals is between ASCII (pronounced "Askey")
and IBM terminals. ASCII Is a code and scheme
of organisation which was adopted by "the indus¬
try under the blessing of the National Bureau
of Standards. But IBM has pointedly Ignored this
standard.
The principal terminal of the ASCII type.
In aheer numbers, is the model 33-ASR Teletype
(trademark of Teletype Corp.). ao this kind of
terminal Is called the "33 ASR type." or "Teletype-
type," or wc even say a given terminal "looks
to the computer like a Teletype."
$*Me l&WNACJ
'foo wWU'ite,
All are ASCII-type unless otherwise noted.
Note: there sre hundreds of types and
brands of terminals available. These are just
some thought*.
PRINTING TERMINALS.
BEST BUY? The model 36 ASR Teletype
gives you upper and lower case, and is otherwise
similar to the standard model 33. $70 a month from
RCA Service Company, Data Communications Dlv.
(offices in major cities); $15/mo. for the coupler.
30-day cancellable but coat* $50 to put in, $24 to
take out.
There Is a cute terminal that behaves just
like the 33 ASR, but is faster and use* NCR
pressure paper or a ribbon, interchangeably.
The Extel Series A teleprinter from Extel Corp. .
310 Anthony Trail, Northbrook, Ill. 60062.
If you like Seledrics, but want lo go to ASCII,
there is one weird possibility.
-fc* £Hlr -w-ti
IBM, however, seems to Uke changing its
systems around a lot, for instance changing its
codes when it brings out a new computer. (For¬
tunately, it just happens that they also sell adap¬
ters between them. Whew.) So IBM-type terminals
arc different by design.
There is one main type, however, exem¬
plified by the IBM model 2741 terminal. Thus we
say a terminal is an "IBM-type" or ”2741-type"
terminal.
A firm called Tycom Systems Corporation
(26 Just Road, Fairfield NY 07006) offers an
interesting alternative. It happens that all Selec-
trics (anyway, Model I and Model II) have a seam
around the midriff at which the typewriter can
be unscrewed into two sections. Clever Tycom!
They make a device which fits between , looks lo
the bottom like the top of the Selectric, and looks
to the top like the bottom. Also, it turns the
Selcctrie into a terminal, receiving ASCII codes
from whatever computer you attach it to and
causing the computer to type them, or sending out
what you type to the computer in ASCII.
Curiously, IBM has given its blessing to
this arrangement, meaning you can have this
ssndwich deal done to a Selectric you rent from
IBM , and serviced under beefed-up IBM mainten¬
ance agreements ($72 per year, or $16.50 per hour,
as of 1970).
DISPLAY TERMINALS (sec p;>. DM 20-1)
There nrc nany brands. None use video.
Both Teletype- and IBM-type terminals
come in either video-screen or printing models,
from a variety of manufacturers.
Indeed, even the Selectric (IBM trademarly,
3M p typing mechanism appears in some
Teletype-type terminals.
There is a very important performance
difference between ASCII and IBM terminals.
The ASCII terminal can send each character typed
by the user - each "keystroke"-- to the computer
immediately. This means that highly responsive
programs can be written, which examine the user’s
input and can reply instantaneously, if need be,
after anything the UBer types.
IBM-type terminals, however, require a
"line feed" character or an "end of transmission"
character to be typed by the user to make it the
computer's turn . This locks the keyboard so the
person can't use it. Then the computer must type
something, ending with its own "unlock" signal
that makes it the person's turn again
Why thia unwieldy deaign? Supposedly it
results from the curious decision, in the design
of IBM's 360 computer, to make all devices
resemble the card reader as far as the computer
U concerned. Just as the card reader reads
punched cards till the last one ia done, the IBM
terminal is designed to send and receive characters
until a "finished" condition is reached.
The earlier video terminals came with
dreadful styling, like a 1940s science-fiction
movie. But as an example of how the market is
developing, one of the handsomest video terminals
is the $1300 Mini-Tec from TEC Incorporated.
9800 North Oracle Road, Tucson, Ariz. 65704.
(t comes covered with wood-grain contact paper
and looks very nice. (You should have seen
their early models.)
The Hazeltine 1000 video terminal rents
for $49/mo. on a 1-year contract. LOWER-CASE
OPTION; modem and coupler apparently not
included. (Hazeltine. Greenlawn, NY 11740,
with offices all over.)
if you have no objection to ITT, they offer
a portable video terminal with built-in modem
and coupler, the Asciscope, for $65/month.
Supposedly there's a long waiting list. (ITT
Data Equipment and Systems Division, East Union
Ave.. East Rutherford , NJ 07073.)
see Kustom Electronics, Inc. (aren't they the
rock-amp people?) , Data Communications Division,
1010 West Chestnut, Chanute. Kansas G6720.
They've already set up travelling terminals for
the mobile constabulary of Kansas City (Mo.) ,
Palm Beach and Nashville. (Communications .
Jan. 73, ad p. 47.) Now, of course, you'll need
a whole stationary radio setup to run that...
Y » u i’
MISCELLANEOUS
Various firms rent lermlnals, some on a
short-term basis. (Some terminal companies
are bad news, keeping up their equipment badly
and offering poor service, so watch it.)
(The day will come, let’s hope it's soon,
that you can rent a terminal overnight or for a
weekend like a movie camera. But till people
get a sense of how far and fast things are moving,
we'll continue to schlock along haphazardly.)
Unfortunately rental people are hard to find,
since they are usually local, and the Yellow Pages
idiotically lump together every possible form of
computer sales and service under "Data Processing
Equipment and Supplies,” and few firms further
specify their business in the listing.
PURTHER POOP
if you're serious about keeping up with
developments in the terminal area, you might
want to subscribe to Terminals Review ($28/yr.),
highly spoken of by Datamation . (GML Corp.,
594 Marrott Rd. . Lexington, MA 02173,)
A "CRT Survey” listing characteristics
of HO CRT displays (including both video ter¬
minals snd fancier pictorial displays - see flip
side of this book) is available for ten bucks
postpaid from Datapra Research Corp., One
Corporate Center, Route 38, Moorestown, NJ
08057.
Jtfj-
“Tv
f"*' net (*«■« r *1).
V'> ^ VTOP, -fj.oe.
VIDEO TERMINALS WITHOUT THE VIDEO
Here are some names (neither endorsed nor
criticized):
Computer Planning I Supply, Chicago
TTS Systems, LA
Vardon a Associates, Dallas
A very hot item right now is a terminal
called the "Digi-Log"-- actually several different
models-- available from Digi-Log Systems. Inc.,
666 Davisville Rd., Willow Grove, Ps. 19090.
A good outfit, that rents both ASCII and
IBM-type terminals of their own manufacture, is
Anderson Jacobson Co. (1065 Morse Ave.,
Sunnyvale, Calif. 94086. and major cities). They
have a Selectric terminal, for instance, which
rents for about $100 a month (about the same as
the standard IBM 2741) bul is portable.
This device fits in a briefcase. Basically
it is a keyboard with a socket for the phone,
and an antenna wire. You phone the computer,
drop the phone handset in the slot, and clip the
wire to the antenna of a TV set. Presto! On the
TV set appears what you and the computer type
at each other.
To provide a memory with your ASCII or IBM-
IBM-type terminal, an odd machine called the
Techlran 4100 (about $1000 from Techlran Indus¬
tries, 580 Jefferson Rd. . Rochester, NY 14623) can
be used for offline storage, it uses a magnetic
cassette. Here are some things you can do with it;
type stuff into the Techtran,
later squirt it to n computer at high speed
receive stuff from a computer at high speed,
later type it back automatically on
the terminal
type into the Techtran, correct it, and then
have it typed back automatically--
no computer.
The question of whether the Techtran can be used
with the Digi-Log has not been publicly resolved.
It happens that Anderson Jacobson (above)
will rent you (heir 2741-type Selectric terminal,
with a Techtran. for about $220 a month total.
But they won't rent the Techtran separately.
A 2741-type Selectric terminal with memory,
offering these same capabilities, is now available'
from IBM! It is the Communicating Mag Card
Executive (CMC). Since the Mag Card Executive,
to which they have added the communication
feature, costs over $200 a month, figure the
communication feature could cost another $100
or so monthly, or probably half again as much
as the Anderson-Jacobson.
Honeywell (Honeywell Information Systems,
Wellesley Hills. Mass.) has recently made
available a Braille program to be used with
"standard terminals” in their systems. (This may
be Ihe adaptation developed at MIT to do Braille
on the 33 ASR.)
For those of us literary types who want
upper and lower case but are stuck with 33ASRs,
a LOWER-CASE CONVERSION KIT is available from
Data Terminals and Communications. Campbell,
California.
CVfiJ* •<**!>
ti < . COecV.c **u -f
'—‘I- (&•)- L)**h**^)
This is especially good for travelling
salesmen (lo communicate with their offices and
ordering system via time-sharing computer)
and executives who do computer work from the
road. Also for people who want to show off
remote computer systems.
Disadvantage: only 42 characters per line,
which is awkward for some things, such as
programming in Fortran.
Price: $1200 to $1400. They also lease, at
rates as low as $40/month (3 years).
No lower-case as yet.
Also available on rental, supposedly, from
Westwood Associates. Inc. , 50 Washington Terrace,
East Orange, NJ 07017.
Ann Arbor Terminals. Inc. (Ann Arbor,
Mich.?) is said to offer a similar unit that is
very nice.
The equivalent IBM-type terminal-- keyboard,
coupler and clip to the TV-- is the IPSA-100.
offered by i.P. Sharp Associates, Inc. (Bridge
Administration Building, Bridge Plaza, Ogdensburg.
NY 13669). Unfortunately it's much larger than
the Digi-Log-- it comes in a medium-size suitcase
— and more expensive ($1700 up). However,
they offer the APL character-set (see APL under
"Magic Languages,” p-2.2) 1,8 an option-- even
a model with both norma) and APL character-sets
as a switch-selectable option (costs even more).
Recently , of all things, plans for a do-it-
yourself unit of this type were announced in a
popular electronics magazine (Don Lancaster,
"TV Typewriter," Radio-Electronics . Sept. 1973,
43-52). This does not include the full plans,
which are available for $2 from TV TYPEWRITER,
Radio-Electronics. 45 E. 17th St.. New York.
NY 10003.
Supposedly this can be built for "around
$120"-- probably a deal more - if you are a skilled
electronics builder or technician. But that looks
to include a great deal of tabor.
The finished unit holds up to 32 characters
per line and up to 16 lines on the screen; a second
memory can be added, to hold a second alternative
screenful.
Upper case only.
TYPE RIGHTER-.
The JUgic T^joevrriUiw
A number of different systems are coi.iiiv
on the market to aid you in error-free typing,
IBM would have you call these "word pro¬
cessing systems," since that makes them sound
of-a-piece with their dictation equipment. Ac¬
tually they're text regurgitation systems, but
let's just call then Magic Typewriters.
Prices of these things tend to run between
$100 and $250 a month.
Generally these are being sold as secre¬
tarial aids, partly because they tend to be too
ungainly for use by writers themselves. A
principal use has been in large law offices,
where contracts, wills and such arc stored as
"boilerplate" (standard sections of Document)
and then modi’ ’ i.e lawyer to
justify the
Such sy onsist of
three things :
Unfortunately some of
quite badly thought out, I
I am not sure whether they
are accidentally or on pur;
pretat ion 'i's flattering to
I have had ex tens
of these systems, the
and the 1HM Mug Card 1:
say that i ■ 1 •• i 1
sectiv.
might !.
these
ive experience with two
IBM Mag Tape Selectric
xecutive. Suffice it to
■ t- . t these systems were
1 ■ accident, then the
■ M and its products
■ lant. As it is,
. :.J!■■■: I . of (say I
to their cui.
given little
else. In bott,
ficial plausibi. :: Mu
ises knots into tangled r.i;■;
verge on the preposterous,
was written on a Mag Laid ! •
dunned -.iirry 1 bothered.
A typewriter , connected to some sort of
magnetic memory , such as a tape, coated
card or"disk, and
editing circuitry , which responds to
various acts by the user.
WHAT THEY DO: allow you to type stuff in, which
is both typed on the paper and at the same time
stored on the magnetic whatever. Small errors
you correct as you type along, generally by
backspacing.
terns of this type are:
iii'- : .-.M Mag Tape Select rn (MI/ST ut MT'-T).
Records on sprocketed 16mm
used for movie sound record;,
different tapes to get coni .
Th- "I
plast i • e! • •* wilt,
magnt-i :t!i of , h.i r.ic t r
The IBM M.i :ric composer (tfi/S ,
MTSCj . Product- > ... , : with the SclMe¬
tric Composer, a wi , r ■ . nus
complications well be. i .ipe
Selectric. Even more v '!.jg
Card Executive. Uses ■ , ,.cs
as MTST.
(Note: fur those who l ti¬
the above devices, hut apprec
a c omp u 11 ■
know wh
Typewriter, and seeus t in
a hidden rienory. App t:
A 111 ;n c.llii-d .1.1V in due-> ’
using a Tycom Selectric Sandui
"Printing Terminals," nearby).
Olivetti has one c .<!
cessing .System. Their
they say, ISO pages oi '
Two other outfits ;
.uni tj ti i ntype.
hoops 1 Here come-.
In-.-.. i i: j_ t n’l They have t.
interested in this sort ot thing,
t [national Word Processing Associa-
r, id, AMS Building, Willow Grove,
the book
for more
13
Xw^cx>vc
Used to be that ordinary people had to
deal with computers by fining out intricate
forms which were then translated into punch
cards! The forms put things in weird cate¬
gories (see "Coded-Down Data," p. U i •)
No longer.
i longer necessary ,
yjterns can now give you i
This is done through the magic of the
TERMINAL. Terminals come in two conspicuous
flavors (typewriter and screen or boob tuoe )
and also have two less-noticeable divisions^
("Teletype" or "industry" versus "IBM type.' )
Anyway,
allows a person and i
other.
Now, computers are merely gadgets for
twiddling information. They no more under¬
stand English, or human psychology, than
puppies can read music. (See Artificial In¬
telligence," p.lt-IS") But the computer's prog¬
ram can, for instance, direct the computer to
type out a simple question, and compare the
user's answer with a simple set of alternatives.
For example, suppose the user is visiting a hos¬
pital. A computer can sign hin in without the
abrasiveness of a receiving nurse, and with far
more patience. The following might be a sample
dialogue. (Here the computer types what s in
caps, and the user*s replies are in lower-case.)
DO YOU HAVE AN ACUTE PAIN? (Y, N, DK)
dk
YOUR ANSWER IS: DK FOR "DON'T KNOW."
DOES THAT MEAN YOU’RE NOT SURE
WHAT 'ACUTE' MEANS? (ANSWER A)
A PAIN COMES AND GOES? {ANSWER B)
YOU HAVE A PAIN SORT OF ON THE
BORDER? (ANSWER C)
IS THIS PAIN IN AN EXACT PLACE YOU
CAN IDENTIFY? (Y,N,DK)
An interactive system of this kind is call-^
ed a conversational system,in that it "converses
Kith the user/ TKe secret is that the alterna¬
tives in the computer program are few and care¬
fully worked out beforehand: there are great pit-
falls when there are too many alternatives, as
when such conversational systems are used for
teaching (sec pp. JiAi )■
Here is a straightforward example: a system
I wish I had for balancing a checkbook. Note
that the inner program for this conversational
system could be written'in any of the three lan¬
guages presented later.
A terminal it simply
any device by which
a person and a computer
can type at each other.
Hide love terminals.
This one it a video
terminal or keyeaope
(see p. DM 104 ). It
allows the computer
to present textual or
numeric information,
play games with you,
quit you for infor¬
mation in a good-guy
system, or whatever
-- depending on the
program, of course.
More expensive scopes
(or computer diop lays )
allow pictorial ani-
mation under the user's
control (discussed
throughout flip side).
THE HATH TUIHC TO
UHDlRSTAHD: what they
do is decided by human
principies." Human
beings take note.
THE NEW FRONTIER IN COMPUTERS IS
CONCEPTUAL SIMPLICITY AND
CLARITY .-
People who delight in intricacy arc going to
have to learn some new tricks. Internal in¬
tricacy is fine, as long as the user doesn't
have to deal with it.
Motto 3 for the new era (to computer
people )s
MAKING THINGS EASY IS HARD.
Motto 4 for the new era:
ANY SYSTEM FOR A SPECIFIC PURPOSE
SHOULD BE TEACHABLE IN TEN
MINUTES OR LESS.
Anyone who has been taught the use of
some fixed-purpose computer system, such as
an airline reservation systen, may doubt this.
But perhaps this book will clarify things
somewhat.
A "COOD-tXY SYSTEM"
computer system that Is
CLEAR,
EASY TO USE,
AMD FRIENDLY.
ANY MAN OF COMMON SENSE CAN
DESIGN A COMPUTER SYSTEM FOR
A PURPOSE IMPORTANT TO HIM:
the data structure, forms of
information, general opera¬
tions, record-keeping, and
responses to on-line users.
But for some reason this is
generally kept a secret.
WHAT PROGRAM WOULD YOU LIKE TO RUN? ckbk
CHECKBOOK PROGRAM STARTS.
DO YOU WANT TO PROOF THE NEW STATEMENT FOR
MARCH? y
PLEASE LIST THE CHECKS THAT HAVE COME IN.
231 , 239 , 240 , 242, 244, 24S.
SUM OF INCOMING CHECKS IS $345.72. DO YOU
WANT BREAKDOWN? n
PRESUMABLY BANK IS CHARGING YOU .60 FOR
SIX CHECKS. ALSO MONTHLY CHARGE OF
FIFTY CENTS (PLEASE CONFIRM), y
ARE THERE ANY OTHER BANK CHARGES THIS
MONTH? n
ARE THE FOLLOWING DEPOSITS ON THIS STATE¬
MENT-- MARCH 1 SALARY, $854,007 y
GIFT FROM AUNT AGATHA, 14 MARCH,
$ 25,00? n
TOTAL ON STATEMENT SHOUIO BE $1753.21.
PLEASE CONFIRM, y
YOUR CURRENT FLOAT IS $656.75. DO YOU KANT
BREAKDOWN? y
CURRENT FLOAT AS FOLLOWS--
NO. 241 IRVING'S RECORDS 7 MARCH $ 6.75
NO. 243 SINISTER 6 MALADROIT (LEGAL
FEES) 12 MARCH $600.00
NO. 246 DOCCIE HAIRDRESSERS
12 MARCH $ 20.00
NO. 247 SAM CRONK (REPAYMENT)
14 MARCH 1 30.00
TOTAL $656.7S
ARE YOU DONE WITH CHECKBOOK PROGRAM? y
(The part shown above is easy. Thinking
out the ways for the user to correct his re¬
cords, and/or the bank, is the tough part.)
COMPANIES THAT WILL SET UP WHOLE
LITTLE BUSINESS SYSTEMS
A number of companies make minicomputers
(partial list on p. 4} ); however, companies
who want business systems built around mini¬
computers may want to investigate companies
that will put together whole business systems
for them around minis.
(It is hoped that one contribution of
this book will be to give the reader a better
idea of what to ask for.)
Types of available
computer terminals
are discueeed in
the next spread ;
more display terminals
discussed p. DM ^0'
Helow: a "bull pen"
of terminals, all
hooked up to the main
computer at the
Chicago Circle Campus,
University of Illinois.
What each person does
at his terminal
is normally independent
of what any other pereon
does, through time ¬
sharing of the main
computer. Installations
more suited to time¬
sharing can have large
numbers of terminals,
all over a campus, a
company or the world;
Two companies that seen to be in this , , 1
:ess are. comsideRAte layout
Genesis One Computer Corporation, i
99 Park Ave., NY 10016. Appears
to use BASIC language (see pp. 16-17).
Qantel Corp. (offices in five major cit¬
ies), Sells a minicomputer of their
own manufacture, using a language
called QIC (Qantel Interactive Code),
which a salesman tells me is "just
like BASIC" (see pp. 16-17). Mini¬
mum setup includes a display terminal,
printer, computer and 6-million-char¬
acter disk, at $31,000. 'v_
'JOE TURKEY USER"
A good friend of mine, Jordan Young,
ia a former R.E.S.I.S.T.O.R. (see p. f7 >
and now a systems programmer (sec p. YJ I
on the mighty Dartmouth tine-sharing sys¬
tem. trrss. (See p. fS\)
Jordan tells »e that one of the more
important people at Dartmouth ia a mythical
individual named Joe Turkey User. Thi# es¬
timable personage knows hardly anything
about computers, makes a lot of mistakes,
thinks he understands what you tell him
when he doesn't, tends to hit the wrong
keys on the terminal, and In genaral tends
to screw up.
But the motto up there is: "If it's
not simple enough for Joe Turkey User—
it's too complicated.“
DTSS is a good-guy system.
YOUR FIRST COMPUTER CONTACT
When you first sit at a computer tsrminal.
the feeling ia one of sheer terror. Swest and
chills, dumpiness and sudden cli»sy nervous
motions, lunstic ebsentmindednesi and stassoering
fear and awkwardness interfere with your ability
to function or understand the person who is
helping you.
THE MOST IMPORTANT COMPUTER TERMS FOR THE '70s
Here are some phrases that will count in the
new era of computing, when we will run into
more and more computer systems set up for
particular purposes.
connected to a functioning computer.
(Note that the computer may be in the
typewriter or desk itself.)
(As distinct from off - tine , setting
things up for processingTater.)
interactive
not just connected, but responding to
you. interactive systems and programs
can respond to your choices and requests,
clarify what they want from you, etc.
remote
referring to something far away, as dis¬
tinct from local . right where you are.
A computer can be either remote or local,
e.g. , on your desk,
front end (n.), front-end ladj.)
whatever stands between you and a system.
A front end can be the terminal in your
office, for example. A front - end program
is one which mediates between a user and
some other system or program, perhaps
collecting data for it by quirting you.
dedicated
set up for only one use. A big computer
at a computing center has to have many
uses; a Little computer in your office
can be dedicated. Dedicated computers
arc now hidden in all sorts of things:
cash registers, for example (see "Micro¬
processors p. L j4 ).
turnkey (adj.)
turned on with a key. Especially,
turnkey systems . small computer systems
that can just be turned on (key or not)
and are fully set up, ready to run,
programmed, etc.
responding to events in the world as nceJed,
without delays. Computer systems that con¬
trol machinery, make airline reservations,
predict the weather or respond to naive users
are real-time. Systems that can catch up
overnight are non-real - line.
intelligent terminal”
stupid term referring to any object that
does more than act like a plain terminal.
The term is stupid because it confuses
distinctions. Some "intelligent terminals’
have extra circuits for various purposes;
others contain their own minicomputers;
still others are ordinary terminals con¬
nected to front-end programs,
ser-oriented
set up for "users"-- people who are not
programmers or input typists, but who
actually need something done,
scr level (n.), user-level (adj.)
"where the user is” mentally; his level
of involvement. User - level system ,
system set up for people who are not
thinking about computers but about the
subject or activity the computer is sup¬
posed to help with,
aive user (n.), naive-user (adj.)
person who doesn’t know about computers
but is going to use the system. Naive-
user systems are those set up to make
tTtfngs eas)T“and clear for such people.
(We are all nuive users at some
time or other; it's nothing to be ashamed
Though some computer people seem to
o being loused up by
think .. -
iot-proof
not susccptib1
naive user.
The hostility in this term may in
some cases be real. Computer people
sometimes forget, or do not wish to tol¬
erate, the degree of confusion that naive
users bring to the keyboard. This atti¬
tude is not just their problem but every
body's, since they lay it on us.
id-guy system .
stand-alone system
system (regardless of
doesn't have to be at
else. (May contain 1
purposel which
tavhed to anything
ts own computer.)
peoplt y Oft. |*TTe '« >* *>jft«r.Tk*- -\nU)
|iO VU6*,<iUf.tr COArulUt TV.
"Modem" takes the terminal's pulse code
and warbles it into the phone as audible
tones. The computer answers with similar
warbles and twaedling; the modem converts
that back into alphabetical characters.
0-S^-
RS-232 is the
CmuriMC.
standard
(21
fr«ei4l
rnwta tVtwf
V |to CVJ HMr h
o*J 4 MiNiCCM| 0 TUt(‘«r IA )
OK 4 bi(r C tmpvree. 0t<. p **)
12
(t'a awfully eaay to fool people with
simple word*, let alone buffalo them with weird
teChnical-soundlng gab. The thing about tech
talk 1» that It can really be applied to any area.
The trick Uee in the arrangement of boxcar
adjective noune, and in the vague uee of windy
terma that have connotatione in •one particular
technical area - aay. the "pace program.
Juat conaider. He might call a common
or garden apade--
A PERSONALIZED EARTH‘MOVING
EQUIPMENT MODULE
A MINERALOOICAL MINI-TRANSPORT
A PERSONALIZED STRATEGIC TELLURIAN
COMMAND AND CONTROL MODULE
AN AIR-TO-GROUND INTERFACE
CONTOUR ADJUSTMENT PROBE
A LEVERAGED TACTILE-FEEDBACK
GEOMASS DELIVERY SYSTEM
OMfUTeu >wdcj
jo sr cute ickcs
Juat the way everyone can underetand camera#, vlt.t
“a caaiara ta a device you point at aouethinq
to willfully capture Ita appearance.“
Juat the way everyone can undaratand care, via.)
"k car la a device people get lnaide which
then goes aowewhere elae, under the willful
control of the driver.”
Well, how about
*A coaputer la a device which manipulates
Information and external ecceasorlea, accor¬
ding to a plan willfully prepared by a planner.'
IUMTiO^L
HistiiM
FICTIONS ABOUT WHAT COMPUTERS DO
Many people suppose there Is nothing
computers cannot do (see p. <5); some peo¬
ple, indeed, think there is nothing com¬
puters do not already do.
A couple of years ago, a leading
picture magazine carried a piece a-
bout Stanford's Artificial intelli¬
gence Laboratory, claiming that one
"Shakey the Robot" had been developed
to near-hunan intelligence and capa¬
bilities. This was pure bosh, since
repudiated in the computer magazines,
but a lot of people Out There in
Readerland believed it. (See "The
God-Builders," flip side.)
Once I had a long discussion with
a somewhat wild-eyed young woman who
believed that the government was moni¬
toring her brain with computers. 1
think I persuaded her that even If
this were feasible it would cost the
government tens of thousands of dollars
to do it, and that probably no existing
government agency was that interested
in her thoughts. I'm not sure she was
persuaded.
A MAN-MACHINE ENERGY-TO-STRUCTURE
CONVERTER
A ONB-TO-ONE INDIVIDUALIZED
GEOPHYSICAL RESTflUCTURIZBR
A PORTABLE UNITIZED EARTHWORK
SYNTHESIS SYSTEM
AN ENTRENCHING TOOL (Flreslgn Theater)
A ZERO-SUM DIRT LEVEL ADJUSTER
A FEEDBACK-ORIENTED CONTOUR
MANAGEMENT PROBE AND
DIGGING SYSTEM
A GRADIENT DISEQUILIBRATOR
A MASS DISTRIBUTION NEGENTROPRIZER
„ k, 'W-!TllLS'tSWl
AN EXTRA TERRESTRIAL
TRANSPORT MECHANISM.
Spades, not words, should be used for
shovelling. But words should help ua unearth
the truth.
In the computer field, the same things arc
often celled by different names (for Instance,
the IBM 1800, a fairly ordinary minicomputer,
Is called by them the "IBM 1800 Data Acquisition
and Control System”), different things are often
called by the same names, end things can be
inside-out and upside-down versions of each
other in extraordinary variety. (Indeed, compu¬
ter people may find this book lnalde-out, which
is okay with me. Life is a Klein bottle.)
Sorting things out. then, means having a
few basic concepts clear In your mind, and
knowing when you see examples and variations
of them.
Computer people often soy that to understand
computers you have to have a * logical mind .*
There’s no such thing. But faying iu oh things
intimidate* many, empeoially those who have
been told they do not have "logioal mind*.*
Vhat is m*ant. aotually, it indeed important: I
in working with computer* you mutt often work |
out the exact ramification* of *p*oifio combi- \
nations of thing*, without skipping steps. I
But the other mod* of thinking, the intuitive, j
has its plane in the computer field too. I
Whichever your habitual style of mind, oomputere
offer you food — and utensils-- for thought. .
HORRIBLE MISUNDERSTANDINGS
Some people think of computers as things
that somehow mysteriously digest and assimilate
all knowledge. "Juet feed it to the computer." is „
the motto. But what you feed Into the computer
juet alia there unlearn there's a program.
"How would you do that by computer?" ta
a question people often ask. The question ihould
be , "how would you do that at ell?" If there la
a method for doing something which can be broken
down Into simple steps, and requires no human
judgment, then maybe we can take those steps
and program them on a computer. But maybe we
can also think of a simpler way to get (hem done.
Then there la the Idea that a computer la
something you aak questions . This assumes , [
guess, the earlier premise. that the computer
has already digested and assimilated a lot of
stuff and can illng it back at you In naw arrange-
WHAT YOU'VE SEEN PROBABLY HASN'T
"A COMPUTER."
Gel out of your head the notion that some
one system you've seen showed you what
Computers Are Really Like. Computer systems
can be as different externally as bats and whales.
(Yet It’s the same kind of heartbeat, but that's
no help In dealing with them.)
Then what is It computer people know ,
you may ask, that leada them to understand
new systems quickly? Aha. Computer people
simply adjust faster to whole new worlds.
If It Isn't, you
j (or your company , or your state)
i may have been sold e bill of goods .
| OR they may have decided
I your inconvenience la leas important
j than something els s.
I In any caae. you have a right to ask
| sharp questions.
THE AUTOMOBILE ANALOGY (more)
"The Interstate was bumper-to-buaper,
but after we had lunch at the rest stop it
cleared up till we got to the tollbooth.
Then Harry got lost on the interchange,
and we had to double back on the service
road."
How incomprehensible to someone from
1905. Yet how simple-minded when you un¬
derstand it. That’s how it is with cora -
Coaputer talk sounds so strange and
incomprehensible to you folks out there--
yet to us in here it's often as simple as
the lines above-- i_f you know the funda¬
mental concepts.
And nothing in the normal everyday
world will have prepared you for then.
It's not jargon, but the simplest
way to express thoughts in these areas.
Handy questions to aiaa up
what a computer la supposed to
be doing.
What data does U contain?
Where is the data stored?
What other data will It
link up to?
*5
USING A COMPUTER
SHOULD ALWAYS BE EASIER
THAN NOT USING A COMPUTER.
WHAT IE THIS SYSTEM ABOUT?
Actually what must happen. to get
"question*" answered, la this: there must be
some program that pul* Input material into a
data structure . (See "Data Structures.*) Then
you need program* that will oounl and trace,
or whatever, through the data structure In weya
you desire. Than you need a way to atari these
tracing and searching program* going through
the data structure in ways you want. So you
need • program accepting Input from a keyboard,
or whatever, and starting the other program*
In operation. . .
THE DAMNED LIE
"Computers are rigid end inhuman."
A BETTER APPROXIMATION
People are sometime!
rigid and inhuman,
animal* are non human
human" applies only
(ell too ofti
(Machines and
the term "
en)
in-
"Rlgid and Inhuman" computer systems
are the creation of rigid end inhuman
people.
Whet information
do you suppose
can reasonably
b* derived from that?
What are th* key
Input and output device*?
In what forma
does Information
go In and outf
What do you suppose
they might want to know?
in t
A new era in computers is dawning.
The first, or Classic, computer era
used straightforward equipment and work¬
ed on straightforward problems.
¥
h.
TP 4.1)
The second, or Baroque, coaputer
era used intricate equipment for hard-
to-understand purposes, tied together
with the greatest difficulty by com¬
puter professionals who couldn't or
wouldn’t explain very well what they
were doing.
But a change is coming. No one com¬
pany or faction is bringing it about, al¬
though some may feel it is not in their
interest. 1 would like to call it here
the DIAPHANOUS age of the computer.
By "diaphanous" I refer both to the
transparent, understandable character of
the systems to come, and to the likeli¬
hood that computers will be showing us
everything ( dia -. across everything,
phainein , toTFow). (E*"I^- r J t .)
In the first place, COMPUTERS MILL
DISAPPEAR CONCEPTUALLY, will becoate
"transparent", in the sense of b«ing
parts of understandable wholes. More¬
over, the "parts" of a computer system
will have CLEAR CONCEPTUAL MEANING.
In other words, COMPUTER SYSTEMS KILL
BE UNDERSTANDABLE. Instead of things
being complicated, they will become
simple.
Now, many people think computers are by
their nature incomprehensible and complicated--
unfortunately, that’s because they have been
MADE TO BE. Usually this is unintentional,
but 1 fear not always. EXAMPLE. Instead of
being told, "this is the mysterious XYZ comput¬
er, it has to have things just so, you have to
fill out these RMi) forms to go into the VJ4...",
you will hear such surprisingly simple things
as "This system is set up for keeping track of
who owes what to the company. On the screen
you can get lists of accounts and outstanding
bills and who owes them; if you point at ona
with the light pen, the printing machine over
here will print a bill all set to go in the
envelope.'
In other words, systems will increasingly
have UNDERSTANDABLE PARTS WITH UNDERSTANDABLE
INTERCONNECTIONS.'
What is responsible for this remarkable
change?
For one thing, smaller and smaller com¬
panies are buying computer services, and they
won't stand for ridiculous complications.
For another thing, a number of people In the
computer field have gotten sick of systems
that make things hard for people. Finally,
the price of computers, especially micro¬
processors (see p. fW ) are coming down to
fast that they cen be tailored to fit people,
rather than vice vers*. But most of all,
it's jus('timo, that’s all.
BIBLIOGRAPHY
C.L. Freitas, "Making the Best Buy for the
Small Business." Computer Decisions .
March 73, 2 2-26.
Compares the relative costs of
minicomputers and time-sharing; concludes
that minis are the beat buy.
Burton L. Katz, "Making Minicomputers Work
in a MtJium-slzed Business." Data
Processing . Winter 1971, 9-11.
Stresses th* point that well-des¬
igned computer systems can be used by
existing personnel of • firm, without
excessive complication.
Frederic G. Withlngton, "Cosmetic Programming."
Datamation, Mar 70, 91-95. How to make
systems triendly on th* outside.
TWDA&WT
HOW DOES THE LOOP WORK?
11
THE MA01C OF THE COMPUTER PROGRAM
The basic, central magical interior device
of the computer we shall call a program follower .
A program follower is an electronic device (usually)
which reads symbols specifying operations, carries
out the step each specifies and goes on to the next.
The program follower reads down the list
of instructions in the program , taking each instruction
in turn and carrying it out before it goes on to
the nsxt.
Now. there are program followers that just
do that and nothing more; they have to stop when
they get to the end of the list of instructions.
A true computer, however, can do several
things more.
It can jump back to an earlier point
in the program and go on from there. Repeating
the program in this fashion is called a loop ■
It can perform tests on symbols in
the memory— for instance, to see if a loop
has been done enough times, or if some other
part of the job has been finished-- and jump
to some other program depending on these
symbols. This is called a branch .
Finally, the computer can change
the Information stored in memory. For instance,
it can place an answer in a specific part
of memory.
WHAT, THEN, IS A (Digital) COMPUTER?
A device holding stored symbols
in a changeable memory,
performing operations on some of those symbols
in the memory,
in a sequence specified by other symbols
in the memory,
sble to change the sequence
based on tests of symbols in the memory,
and able to change symbols in the memory.
(For example, do arithmetic and
store the result in the memory.)
Rather than try to slip it to you or prove
it in some fancy way. let's just state baldly: the
power of auch a machine to do almost anything
surpasses all previous technical tricks in human
history.
ftJNdirie
4LL JKVI i&C
Look muc.
HOW CAN A COMPUTER CONTROL
SO MANY DIFFERENT THINGS?
Answer . Different as they may seem, all
devices are controlled in the same way . Every
device has an Interface , that is, its own special
connection setup, and in this interface are the
device registers .
These device registers look the same to the
computer: the computer program simply moves
information patterns into them or moves information
patterns from them to see what they contain.
cotAV’imx
11 *; a*\ 'hfarf&dz ? "
fa LaU^ K»cJr*e.
*Tun*j You 0 ^,“
-"1
Con*
rv-
—
In
the device needs
—il
heart patient
oil refinery
musical Instrument
display screen
disk memory
The computer, being a machine, doesn't
know or care that device register 17 (say) controls
a hog feeder, or device register 23 (say) receives
information from amog detectors. But what you
choose, in your program, to put into device register
17 , controls what the hogs eat, and what comes
into device register 23 will tell your program,
you hope, about smog conditions. Choosing how
to handle these things in your program la your
business.
The computer does things over and over
by changing a stored count , then testing the stored
count against another number which is what the
count should get to, and going to the beginning
if the desired count has not been reached. This
is called a loop . Of there's no way it can ever
get out, that’s an endless loop.) (Actually, the
program loop Is done the same way as a program
branch: IF a certain count has not been reached,
it branches BACK to the start of the loop.)
Other things besides programs may be stored
in the memory. Anything besides programs are
usually called data.
(erf
r r \r-
%
—
r'*o
The instructions of programs use the data in different
ways Some programs use a lot of data. some use
a little, some don't use any. It is one of the fascinating
and powerful things about the computer that both
the instructions of s program, and the data they work
on, are stored as patterns of bits in the same memory,
where they can be modified as needed. Indeed, the
program can modify its own patterns of bits, a very
important feature.
WHAT DO PROGRAMS LOOK LIKE?
In what forms are these programs stored,
you ask? Well, they are written by people in computer
languages , which are then stored in some form in
the computer's fast core memory, where the program
follower can act on them. But what does a computer
language look like, you ask? Aha...
Go TO PAGt I b
Gf you want to see what the bottom-most level looks
like, with all the bits and things, skip ahead to p.3£)
WHATEVER IT MAY DO IN THE REAL WORLD,
to the computer program
it's just another device.
ANALOG COMPUTERS DISPOSED OF
There are two kinds of computers: analog
and digital. (Also hybrid . meaning a combination.)
Analog computers are so unimportant compared to
digital computers that we will polish them off in
a couple of paragraphs.
"Analog" is a shortened form of the word
"analogy." Originally an "analog" computer was
one that represented something in the real world
by some other sort of physical enactment-- for
instance, building a model of an economic system
with tubes and liquids; this can demonstrate
Keynesian economic principles remarkably well.
However, the term "analog" has come to mean
almost exclusively pertaining to measurable
electrical signals , and an "analog computer" is
a device that creates or modifies measurable
electric signals. Thus a hi-fi amplifier is an
analog computer (it multiplies the signal), a music
synthesizer is an analog computer (it generates
and reshapes analog signals). Thus the term has
deteriorated: almost anything with wires is an
analog computer.
Analog computers cannot be truly programmed.
only rewired.
Analog equipment is useful, important and
indispensable. But it is simply not in the same
class with digital computers, henceforth called
"computers” In this book, which manipulate symbols
on the basis of changeable symbolic programs.
"Analog computer" also means any way of
calculating that involves measuring approximate
readings, like a slide rule.
10
W fWMTHt &t°^{
Forget what you’ve ever heard or imagined
about computers. Just consider this:
The computer is the most general machine
man has ever developed. Indeed, it should be
called the All-Purpose Machine, but isn't, for
reasons of historical accident (see nearby).
Computers can control, and receive information
from, virtually any other machine. The computer
is not like a bomb or a gun, which can only des¬
troy , but more like a typewriter, wholly non¬
committal between good and bad in its nature.
The scope of what computers can do is breath¬
taking. Illustrated are some examples (although
having all this happen on one computer would be
unusual). It can turn things on and off, ring
bells, put out fires, type out on printing machines.
THE Au-purpose
Computers are COMPLETELY GENERAL,
with no fixed purpose or style of operation.
In spite of this, the strange myth has evolved
that computers are somehow "mathematical."
Actually von Neumann, who got the general
idea about as soon as anybody (1940s), called
the computer
THE ALL-PURPOSE MACHINE.
(Indeed, the first backer of computers after World
War II was a maker of multi-lightbulb signs. It
is an interesting possibility that if he had not
been killed in an airplane crash , computers
would have been seen first as text-handling and
picture-making machines, and only later developed
for mathematics and business.)
We would call it the All-Purpose Machine
here, except that for historical reasons it has
been slapped with the other name.
A HELPFUL COMPARISON
It helps sometimes to compare computers with typewriters.
Both handle information according to somebody's own viewpoint.
Many ordinary people find computers
intuitively obvious and understandable;
only the complications elude them. Perhaps
these intuitively helpful definitions may help
your intuition as well.
Nervous Question
"Can a Computer
Write a Poem?"
"Can't Computers Only
Behave Mechanistically?"
"Aren't Computers
Completely Impersonal?'
Helpful Parallel
"Can a Typewriter
Write a Poem?"
(Sure. Your poem.)
"Can't Typewriters Only
Behave Mechanistically?"
(Yes, but carrying
out your intent.)
"Aren't Typewriters
Completely Impersonal?"
(Well, it's not like handwriting,
but it’s still what you say.)
1. Think of the computer as a
WIND-UP CROSSWORD PUZZLE.
2. A COMPUTER IS A DEVICE FOR
TWIDDLING INFORMATION. (So, what kinds
of information are there? And what are the
twiddling options? These matters are what
the computer field consists of.)
3. A computer is a completely general
device, whose method of operation may be
c hanged , for handling symbols in any
specific way .
i
BwinlV Boot\e$
Cybercrud Is not aimed only at laymen.
It can work even among insiders.
The operations manager of a national
time sharing service, for example, was fanatical
about cleanliness. In order to assure a Clean
Computer Room, he said. and hence no dangerous
dust near the tapes or disks . he made a rule
requiring that anyone entering the computer room
had to wear cloth booties over his shoes .
Booties were hung outside for those who
had to enter.
"And 1 had the greatest time making his."
says his wife, laughing. "With the cutest little
bunny faces on them. The buttons were the
hardest part to get - you know , the ones with
eyes that roll !" She laughs very hard as she
tells this.
"Of course there was no need for it." he
now chortles, "but it sure kept people out of the
computer room."
(That’s applied logic for you.)
Ci )-^
COMPUTERS
AND THEIR PRIESTS
First get it through your head that computers are big,
expensive, fast, dumb adding-machine-typewriters. Then
realize that most of the computer technicians that you're
likely to meet or hire are complicators, not simplifiers.
They’re trying to make it look tough. Not easy. They're
building a mystique, a priesthood, their own mumbo-
jumbo ritual to keep you from knowing what they - and
you-- are doing.”
-- Robert Townsend,
Up The Organization (Knopf), p, 36.
Ute ciwo-cvir ASPedr
Outsiders arc often prey to cybercrud they
dream up themselves. I once knew a college
registrar’s office where they had been getting
along fine for years with paper forms. The year
before the computer was slated to arrive, they
started using file cards filled out by hand, instead.
Why? "Well, we thought that would make it easier
for the computer. Computers use cards, don't they?”
Note that referring to a computer as if it were
a living creature is n<rt cybercrud; to say that a
program "looks at" a device, "tries to" effect a
procedure, and "goes to sleep," are all colorful
brief ways of describing what really happens.
(See Guidelines for Writers and Spokesmen, p. V7 )
NttfTjte&TTwetr
PWiV w fosszx?
Cybercrud is, of course, just one branch of
THE GREAT GAME OF
TECHNOLOGICAL PRETENSE
that has the whole world in its grasp.
tea
4 M —
urftu tkl)
II
Public thinking about computers is heavily
tinged by a peculiar image which we may call the
Myth of the Machine. It goes as follows: there is
something called the Machine, which is Taking Over
The World. According to this point of view
The Machine is a relentless, peremptory, repetitive,
invariable, monotonous, inexorable, implacable,
ruthless, inhuman, dehumanizing, impersonal
Juggernaut, brainlessly carrying out repetitive
(and often violent) actions. Symbolic of this
is of course Charlie Chaplin, dodging the relent¬
less. repetitive, monotonous, implacable,
dehumanizing gears of a machine he must deal with
in the film Modern Times .
Ordinarily this view of The Machine Is
contrasted with an idea of a Warm Human Being,
usually an idealized version of the person thinking
these thoughts.
The Warm
Machine^ Human
Being
But consider something. The model often
goes further than this. The Machine is cold, the
Human Being emotional and warm. Yet there is
such a thing as being too emotional and warm.
There is in fact a third type in the schema, the
being who goes too for on the same scale. Strangely,
he has ot least three different names, though the
picture of him is abstractly the same;
X- X
The Warm
Machine Human
Being
V
*
"Bum”
'Nigger”
"Hippie”
Now. "bums." "niggers” and "hippies" are
not real people. The words are derogatory slang
for the destitute, for persons with any African
ancestry, and for people dressing in certain styles.
But the remarkable thing about the slang is that
all three of these derogatory terms seem to have
the same connotation in our culture: someone who
is dirty , lazy and lascivious . In other words,
whatever distinguishes The Machine from the
Warm Human Being is carried too far by the bunch
at the other end.
In other words, this conceptual continuum
is a single, fundamental scale in our culture:
why is unclear. Since most people consider
themselves-- naturally!-- to be in the middle
category. it acts as a sort of reference continuum
of two bad things on either side.
It also has another effect: it supplies a
derogatory way of seeing. On the right hand side,
it allows many Americans not to see, or to see
only with disgust, the destitute and those with
African ancestry and those dressing in hippie style.
But this book isn't about that.
The left side of the continuum is our present
concern. There, too. people refuse to see. What
people mainly refuse to ace is that machines in
general aren't like that , relentless, repetitive,
monotonous, implacable, dehumanizing. Oh, there
are some machines like that, particularly the
automobile assembly line. But the assembly line
was designed the way it is because it gets the most
work out of people. It gets the work it does out of
people by the way it exerts pressure.
So here we see the same old trick; people
building a system and saying it has to work that way
because it’s a machine, rather than because that's
how 1 designed it.
To make the point clearer, let’s consider
some other machines.
The automobile is a machine, but it la hardly
the repetitive, "dehumanized" thing we usually
hear about. It goes uphill, downhill, left and right,
fast and slow. It may be decorated. It is the scene
of many warm human activities. And most impor¬
tantly . automobiles are very much the extension of
their owners . exemplify ing life-style, personality,
and ideology. Consider the Baja Buggy Volkswagen
and the ostentatious cushy Cadillac. Consider the
dashboard ornament and the bumper sticker.
The Machine, indeed.
The camera is a machine, but one that allows
its user to freeze and preserve the views and Images
of the world he wants.
The bicycle is a machine. but one that brings
you into personal and non-polluting contact with
nature, or at least that stylized kind of nature
accessible to bicycle paths.
To sum up, then. The Machine is a myth.
The bad things in our society are the
products of bad systems, bad decisions
and conceivably bad people, in various
combinations. Machines per se are
essentially neutral, though some machines
can be built which are bad indeed,
such as bombs, guns and death-camps.
The myth of The Machine la a curious aspect
of our ideology . Is it especially
American, or world-wide?
If we ignore this myth we can see each possible
machine or system for what it la, and
study how it ties in with human life
for good or ill, fostering or lousing up
such things as the good life, preser¬
vation of species, love and self-respect.
W MTH
"The computer is the ultimate Rorschach
test,” Freed Bales said to me twelve years ago.
Dr. Bales, a Harvard psychologist, was somewhat
perturbed by the papers he was getting in his
seminar on computer modelling in the social
sciences. Somewhat nutty people in the seminar
were writing somewhat nutty papers for him.
And truer words were never spoken. On
this point I find Bales has been terribly, terribly
right. The computer is an incredible projective
test: what you see in the computer comes right off
the back wall of your psyche. In over a decade
in the field I have not ceased to marvel at the way
people's personalities entwine with the computer,
each making it his own- - or rejecting it-- in his
own, often unique and peculiar way, deeply re¬
flecting his concerns and what is in his heart.
Yes. odd people are attracted to the computer,
and the bonds that hold them are not those of
casual interest.
In fact, people tend to identify with it.
In this light we may consider the often-
heard remarks about computers being rigid,
narrow, and inflexible. This is of course true in
a sense, but the fact that some people stress it
over and over is an important clue to something
about them. My own impression is that the people
who stress this aspect are the comparatively rigid,
narrow and inflexible people.
Other computer experts, no less worthy,
tell us the computer is a supertoy. the grandest
play machine ever to be discovered. These
people tend to be the more outgoing, generous
and playful types.
In a classic study, psychiatrist Bruno
Bettelheim examined a child who thought he was
a machine , who talked in staccato monosyllables.
walked jerkily and decorated the side of his bed
with gears. We will not discuss here the prob¬
able origins and cure of this complex: but we
must consider that identifying with machines is
a crucial cultural theme in American society,
nn available theme for all of us. And it well may
be that computer people are partaking of this same
self-image: in a more benign form, perhaps, a
shift of gears (as it were) from Bettelheim'a
mechanical child, but still on the sume track.
Some of the computer high-chool kids I've
known, because of their youth, have been even
more up-front about this than udults.
I know one boy. for instance, whose dream
was to put a 33ASR Teletype on wheels under
radio control, and alarm people ut the computer
conference by having it roll up to them and clatter
out questions impersonally. (If you knew the kid
- aloof and haughty-seeming- you might think
that's how he approaches people in real life.)
1 know a high-school boy (not a computer
expert) who programmed a computer to type out
a love story, using the BASIC "print" command,
the only one he knew. He could not bring
himself to write the love story on paper.
The best example I can think of. though,
took place at the kidB' booth (see p .¥} > “* “
computer conference. One of the more withdrawn
girls was sitting at an off-line video terminal,
idly typing things onto the screen. When she
had gone a sentence remained, it said:
1 love you all, but at a distance.
I -1
(On the other side of this book, Dream
Machines, we will carry this matter further.
The moat exciting things in the computer field
are coming from people trying to realize their
wildest dreams by computer: artificial intel¬
ligence. computer music, computer picture¬
making and so on.)
I
A number of people have gotten mad si me
for coining the term "cybercrud." which I define
as "putting things over on people using computers.
But as long as it goes on we'll need the word At
every corner of our society , people are issuing
pronouncements and making other people do things
and saving it's because of the computer . The
function of cybercrud is thus to confuse, intimi¬
date or pressure. We have all got to get wise to
this if it is going to be curtailed.
Cybercrud takes numerous forms. All of
them, however, share the patina of "science" that
computers have for the layman.
la) COMPUTER AS MAGIC WORD
The moat delicate, and seemingly innocent,
technique is the practice or naming things so as
spuriously to suggest that they involve computers.
Thus there is a manufacturer of pot-pipes with
"Data" in its name, and apparently a pornography
house with a "Cyber-".
lb) COMPUTER AS MAGIC INGREDIENT
The above seems silly, but it is no less silly
than talking about "computer predictions" and
"computer studies" of things. The mere fact that
a computer is^ involved in something has no bearing
on its character or validity . The way things are
done with computers affects their character and
validity, just like the way things are done without
computers. (Indeed, merely using a computer
often has no bearing on the way things are done.)
This same technique is easily magnified to
suggest, not merely that something involves
computers, but is wholly done by computers. The
word "computerize" performs this fatal function.
When used specifically, as in computerize the
billing operation , it can be fairly clear; but make
it vague, as in computerize the office , and it can
mean anything.
"Fully computerize" is worse. Thus we hear
about a "fully computerized" print shop, which
turns out to be one whose computers do the type¬
setting; but they could also run the presses, pay
the bills and work the coffee machine. For prac¬
tical purposes, there is no such thing as "fully”
computerized. There is always one more thing
computers could do.
2) WHITE LIES: THE COMPUTER MADE ME DO IT
Next come all the leelle white lies about how
such-and-such ia the computer's fault and not
your decision. Thus the computer ia made a
General Scapegoat at the same time it's covering up
for what somebody wants to do anyway .
"It has to be this way."
"There's nothing we can do; this ia all
handled by computer."
"The computer will not allow this."
"The computer won't let ua."
The translation ia, of course, THE STINKY LOUSY
PROGRAM DOES NOT PERMIT IT. Which means in
turn: WE DO NOT CHOOSE TO PROVIDE. IN OUR
PROGRAMS AND EQUIPMENT. ANY ALTERNATIVES.
Now , it is often the case that good and
sufficient reason exists for the way things are done.
But it ia also often the case that companies and the
public are inconvenienced, or worse, by decisions
the computer people make and than hide with their
Claim of technical necessity . (Seep.tfi,: Dealing
with computer people.)
3) YAGOTTAS: COMPUTER AS COERCER
More aggressively, cybercrud Is a technique
for making people do what you want. "The com¬
puter requires it," you say , and so people can be
made to hand over personal information, secretaries
can be intimidated into scouring the files, payment
schedules can be artificially enforced.
THE GENERAL STATUS TRICK
Status tricks, combining the putdown and
the self-boost, date back to times immemorial.
But today they take new forma. The biggest trick
is to elevate yourself and demean the listener at
the same time, or, more generally, the technique
is making people feel stupid while acting like a
big cheese. Thus someoneone might say ,
"People must begin to get used to (he objec¬
tive scientific ways of doing things
that computers now make necessary."
But the translation seems to be:
"People must get used to the inflexible,
badly thought out, inconvenient and
unkind systems that I and other
self-righteous individuals and com¬
panies are inflicting on the world."
YOU DON’T ALWAYS GOTTA
The uninformed are bulldozed, and even
the informed are pressured, by the foolish myths
of the clever, implacable and scientific computer
to which they must adapt. People are told they
have to "relate to the computer." But actually
they are being made to relate to systems humans
have designed around it, in much the same way
a sword dance is designed around the sword.
When establishment computer people say
that the computer requires you to be systematic,
they generally mean you have to learn their system.
But anyone who tells you a method "has to be
changed for the computer" is usually fibbing.
He prefers to change the method for the computer.
The reasons may be bad or good. Often the
computer salesman or indoctrinator will present
as "scientific” techniques which were doped out
or whomped up by a couple of guys in the back
"If it can't be done in COBOL,
I Just tell people it can't be done by computer.
It saves a lot of trouble."
Attributed to somebody in Rochester.
(See COBOL. p7) | .)
it v
s L->
In the movie "Fail-Safe," they showed you
lots of fake tape drives with the reels constantly
turning in one direction. This they called a
"computer ," Calling any sinister box "a computer"
is a widespread trick. Gives people the willies.
Keeps ’em in line.
Here is an example, as told to me. A friend
of mine worked in a dress factory where they had
a perfectly good system for billing and bookkeeping.
Customers were listed by name and kept in alpha¬
betical order. The fast pace of the garment indus¬
try meant that companies often changed names, and
so various companies had a number of different
names in the file. This bothered nobody because
the people understood the system.
Then management bought a small computer,
never mind what brand, and hired a couple of guys
to come in and put the bookkeeping system on it.
Still okay. Indeed, small programming firms
can sometimes do this sort of thing very well,
because they can work flexibly with the people
and don’t necessarily feel committed to making it
work a certain way .
Well, this was a nice instance where the
existing system could have been exactly trans¬
ferred to the computer. The fact that some custom¬
ers had several names would certainly have been
no problem; a program could have been written
that allowed users to type any acceptable customer
name, causing the computer to look up the correct
account (and if desired. print its usual name and
ask for verification).
But no. The guys did not answer employees'
questions comprehensibly, nor did they want sug¬
gestions. They immediately decreed that since
computers only worked with numbers (a fib. but
a convenience to them), every customer would
thenceforth have to be referred to by number.
After that the firm had nothing but trouble,
through confusion over the multiple names, ond
my friend predicted that this would destroy the
company. I haven't heard the outcome.
This story is not necessarily very inter¬
esting; it merely happened. It's not a made-up
example.
Moral: until we overthrow the myth that
people always have to adapt to computers, rather
than the other way around, Ihinga will never go
right. Adaptations should take place on both
sides, darn It.
nr *«- deposit,
7r
( k ( ( Hi- of a thr^e n.-irt I ’ ecnJir e
’•Panted „„ ; Ubs “ith th„ „„„
«"<■£&, *• r, —
r *"*»*<-* „ f , Jr '';'’""''" 11 you
,nth '
"° w i,b »'«
' “ ui -
You can buy little boxes with blinking
lights that do nothing else but blink. They
really put people uptight. "Are you recording
what I say’" people ask. "Is it a computer?"
They’ll believe such a box is anything you tell them.
EVERYBODY DOES IT
Cybercrud is by no means the province of
computer people alone. Business manipulators
and bureaucrats have quickly learned the tricks.
Companies do it to the public. The press , indeed,
contributes (see Suggestions for Writers and
Spokesmen, p. ^7 > ■ But the computer people are
best at it because they have more technicalities
to shuttle around magically; they can put anybody
down.
Now , computer people do deserve respect.
So many things that people do with computer# ere
herd . It can be understood that they want to be
appreciated, and if not for the particulars, for
the machismo (machinlsmo?) of coping with intri¬
cacy . But that ia no excuse for keeping others In
controlled ignorance. No man hae a right to be
proud that he is preserving and manipulating
the ignorance of others .
1) to manipulate situations.
2) to control others.
3) to fool
4) to look like hot stuff.
5) to keep outsiders from seeing through something.
6) to sell something.
7) to put someone down.
8 ) to conceal.
9) general secretiveneas.
10) low expectation of others’ mentality .
11) seeking to be the broker and middleman for
all relations with the computer.
12) vagueness sounds profound.
13) you don’t have to show what you're not sure of.
14) your public image is monolithic.
15) you really don't know
THE MAIN COMPUTER ORGANIZATIONS
ACM, the Association for Computing Machinery.
This is the main computer professional
society; the title only has meaning histor¬
ically. as many members are concerned not
with machinery itself, but with software,
languages, theories and so on.
If you have any plans to stick with
the subject, membership in the Association
for Computing Machinery is highly recom¬
mended. ACM calls itself "The Society of
the Computing Community." Thus it properly
embraces both professionals and fans.
Dues for official students are $8 a yea^ji
$35 for others, which includes a subscription
to Communications of the ACM . the official ^
mag. Their address for memberships and
magazines is ACM, P.O. Box 12105,
Church St. Station, New York, NY 10249.
(The actual ACM HQ is at 1133 Ave. of the
Americas, New York, N.Y. 10036.)
They have stacked the deck so that
if you want to subscribe to any ACM maga¬
zines you'd better join anyway . Here are
the year prices:
Member Non-Member
Communications of the ACM
free
$35
Computing Surveys
$7
$25
Computing Reviews
$12.50
$35
Journal of the ACM
$7
$30
The one drawback to joining the ACM
is all the doggoned mailing lists it gets you
on. It's unclear whether there's anything
you can do to prevent this, but there oughta
be.
SIGs and SICs . For ACM members
with special interests (and we all have them),
the ACM contains subdivisions-- clubs within
the club, of people who keep in touch to
share their interests. These are called SICs
(Special Interest Committees) and SIGs
(Special Interest Groups). There are such
clubs-- SICs and SIGs— in numerous areas,
including Programming Languages , Computer
Usage in Education, etc. Encouraging these
subinterests to stay within ACM saves a lot
of trouble for everybody and keeps ACM the
central society.
AFIPS.
AFIPS is the UN of computing. They
sponsored the Joints, and now sponsor the
NCC. Just as individuals can't join the UN,
they can't join AFIPS, which stands for
American Federation of Information Proces¬
sing Societies. Depending on your special
interests, though, you can join a member
society.
The constituent societies of AFIPS are,
as of June 1973: (If any turn you on, write
AFIPS for addresses: AFIPS, 210 Summit Ave.,
Montvale NJ 07645.)
ft ACM: the Association for Computing Machinery ,
IEEE, the Institute of Electrical and Electronics
Engineers. This is the professional society
of electronics guys.
Simulation Councils. This is the professional
society for those interested in Simulation
(see p.TiKy.
Association for Computational Linguistics . (Where
language and computer types gather.)
American Association of Aeronautics and
Astronautics.
American Statistical Association.
Instrument Society of America.
Society for Information Display . (See flip side. )
American Institute of Certified Public Accountants.
American Society for Information Science. (This
group is mainly for electronifled librarians
and information retrieval types-- see
flip side.)
Society for Industrial and Applied Mathematics.
Special Libraries Association.
Association for Educational Data Systems.
IFIP. This is the international computer society.
Like AFIPS, its members are societies, so
joining ACM makes you an IFIP participant.
CONFERENCES .
Conferences in any field are exciting, at least
till you reach a certain degree of boredom with the
field. Computer conferences have their own heady
atmosphere , compounded of a sense of elitism , of
being in the witches' cauldron, and the sure sense
of the impact everything you see will have as it all
grows and grows. Plus you get to look at gadgets.
Usually to go for one day doesn't cost much,
and at the bigger ones you get lots of free literature,
have salesmen explain their things to you, see
movies, hear fascinating (sometimes) speakers.
THE JOINTS! The principal computer confer¬
ences have always been the Spring Joint
Computer Conference, held in an
astern city in May, and the Fall Joint
Computer Conference, held in a Western
city in November (the infamous Spring
Joint and Fall Joint, or SJCC and FJCC).
In 1973, because of poor business the
previous year, the two were collapsed
into one National Computer Conference
(NCC) in June (Universal Joint?) The
Joints have always been sponsored by
AFIPS (see below). The National
Computer Conference will henceforth
be annual, at least for a while .
The cost of attending is high--
while it's just a couple of dollars to
look at the exhibits, this rises to
perhaps fifteen dollars to go to the day's
technical sessions or fifty for the week
(not counting lodging and eats)-- but
it's very much worth it. The lower age
limit for attendees is something like
twelve, unfortunately for those
with interested children.
Other important conferences: the annual ACM
conference in the summer; BEMA
(Business Equipment Mfrs. Assn.)
in the fall and spring (no theory, but
lots of gadgets); and other conferencs
on special subjects, held all the time
all over. Lists of conferences and
their whereabouts are in most of the
magazines; Communications of the ACM
and Computer Design have the biggest
lists.
CONFERENCE PROCEEDINGS ** AC*\fc5/
V *">*, \
<t{CT5.'J
As you may know , conferences largely con¬
sist of separate "sessions" in which different people
talk on specific topics, usually reading out loud from
their notes and showing slides.
Conference proceedings are books which
result from conferences. Supposedly they contain
what each guy said; in practice people say one thing
and publish another, more formal than the actual
presentation.
This leads to a curious phenomenon at the
main computer conferences (SJCC.FJCC. ACM and
now NCC). When you register they give you a book
(you're actually paying perhaps $15 for it), contain¬
ing all the papers that are about to be given, nicely
tricked out by their authors. If you rush to a corner
and look at the book it may change your notion of
which sessions to go to.
Anyway . the resulting volumes of conference
proceedings are a treasure trove of interesting papers
on an immense variety of computerish and not-so-
computerish subjects. Great for browsing.
Expensive but wonderful. (Horrible when you're
moving, though, as they are big and heavy.)
JOINT PROCEEDINGS. Proceedings for the
Spring Joint and Fall Joint, from the
fifties to 1972. are available from AFIPS
Press, as are proceedings of the 1973
NCC. (AFIPS Press, 210 Summit Avenue,
Montvale NJ 07645.) They cost $20-26
each after the conference is over; less
in microfilm. (At the Joint Conferences,
AFIPS Press often gives discounts, at
their booth, on back Joint proceedings.)
t^>If you want to spend money to
learn about the field. Proceedings of
the Joint Conferences are a fine buy.
Back ACM Proceedings . From the ACM.
Other Proceedings . Often sold at counters at
conferences. Or available from various
publishers. Join the ACM and you'll
find out soon enough .
TRY TO GET TO THE NATIONAL JOINT. Just as
every Muslim should go to Mecca, every
computer fan should go to a National Joint
(National Computer Conference, or NCC).
The next two are (check the magazines):
May 1974, Chicago
May 1975 rS on Fr a noi s o o- f\ M A H .
NO QUALIFICATIONS ARE NEEDED . Think of it
as a circus for smart alecks, or, if you
prefer, a Deep Educational Experience.
VOH^T if You nice ^cMporeit tookjci?
There is a lot of talk about "best" ways of teaching about computers, but in most places
the actual alternatives open to those who want to learn are fairly dismal.
Universities . Universities and colleges tend to teach computing with a mathematical
emphasis at the start. Indeed, most seem to require that to get into the introductory computer
course, you must have had higher math (at least calculus, sometimes matrix algebra as well).
This is preposterous, like requiring an engineering degree to drive a car. (Gradeschool kids
can learn to program with no prerequisites.)
t£>- It seems to be to cut down enrollment, since they're not set up to deal with all those
people who want to learn about computers. (And why not?) Also it's a status thing; as if
this restriction somehow should keep enrollment to students with "logical minds, whatever
those are, or "mathematical sophistication," as if that were relevant.
IFIP holds conferences around the
world. Fun, Expense.
" Computer schools," community and commercial colleges, on the other hand, tend to
prepare students only for the most humdrum business applications-- keypunching (which is
rapidly becoming obsolete), and programming in the COBOL language on IBM business systems.
This gets you no closer to the more exciting applications of computers than you were originally.
Some experimental trends are more encouraging. Some colleges, for instance, offer
"computer appreciation courses." with a wider introduction to what's available and more varied
programming intended to serve as an introduction to this wider horizon.
Highschool courses seem to be cutting through the junk and offering students access to
minicomputers with quickie languages, usually BASIC. Both Digital Equipment Corp. and
Hewlett-Packard seem to be making Inroads here.
Kiddle setups , rumored to exist in Boston and San Francisco, are geared to letting
grade-school children see and play with computers. Also one company (General Turtle, see
p. k 3'/) is selling computer toys intended to encourage actual programming by children.
6
VOOE
JUTOrtyinoiJ 'W«5
There are several major places you get infor¬
mation In the computer field: friendB. magazines,
bingo cards, conferences and conference proceedings.
FRIENDS.
Computer . (Formerly IEEE Computer Group
News.) $12/yr. Thoughtful, clearly
written articles on high-level topics.
Quite a bit on Artificial Intelligence
(see flip side). IEEE Computer Society,
16400 Ventura Blvd., Encino CA 91316.
Here are some other magazines that may
interest you. No particular order.
PCC . Delightful educational/counterculture
tabloid emphasizing computer games
and fun. Oriented to BASIC language.
$4/yr. from People's Computer Com¬
pany, P.O. Box 310, Menlo Park,
CA 94025.
Friends we can't help with. But you might
make some at conferences. Or join a computer club?
MAGAZINES.
The principal magazines are (first few listed
roughly by degree of general interest):
Datamation . $15 a year or free. The main
computer magazine, a breezy, clever
monthly. Lots of ads, interesting arti¬
cles the layman can read with not much
effort. Twits IBM.
Subscriptions are $15 if you're
not a computer person, free if you are.
Datamation , 35 Mason St., Greenwich
CT 06830.
Computer Decisions . Some $7 a year or free.
Some nice light articles, as well as
helpful review articles on different
subjects. Avoids technicalities.
Computer Decisions , 50 Essex St. ,
Roselle Park NJ 07662.
Computers and Automation . Avoids techni¬
calities but quite a bit of social-interest
stuff. Nobody gets it free; something
like $7.50 a year. Berkeley Enter¬
prises, Inc., 815 Washington St. ,
Newtonville, Mass. 02160.
Computing Reviews . Prints reviews, by
individuals in the field, of most of the
serious computer articles. Useful, but
subject to individual biases and gaps.
(See ACM, below.)
The New Educational Technology' . $5/yr.
Presumably concentrates on activities
of its publisher: General Turtle, Inc. ,
545 Technology Square, Cambridge,
MA 02139: wonderful computer toys for
schools and the well-heeled.
The Honeywell Computer Journal . Something
like $10 a year. Honeywell Information
Systems, Inc., Phoenix, Arizona.
Showcase magazine of miscellaneous
content; readable, nicely edited. Has
unusual practice of including microfiche
(microfilm card) of entire issue in a
pocket.
IBM Systems Journal . Showcase technical
journal of miscellaneous content,
especially arcana about IBM products.
$5/yr. IBM, Armonk, NY 10504.
IBM Journal of Research and Development .
Showcase technical journal of miscel¬
laneous content. $7.50/year. IBM,
Armonk, NY 10504.
Computcrworld (actually a weekly tabloid
paper). Not free: $9 a year. More
up-to-the-minute than most people
have time to be. Computerworld ,
Circ. Dept., 797 Washington St..
Newton, Mass, 02160.
Computing Surveys . Excellent, clearly
written introductory articles on a
variety of subjects. Any serious
beginner should definitely subscribe
to Computing Surveys. (See ACM,
below.)
Journal of the ACM . A highly technical, math-
'A oriented journal. Heavy on graph theom
' ' / and pattern recognition. (See ACM.
below.)
Digital Design . $15 or free. About computer
parts and designs. Digital Design ,
Circ. Dept. , 167 Corey Road, Brookline,
Mass. 02146.
Infosystems . Aspiring mag. $20 or free.
Hitchcock Publicatons. P.O. Box 3007,
Wheaton, Ill. 60187.
Communications of the ACM . High-class
•Aar' a*'' journal about theoretical matters and
* CV-Jy events on the intellectual side of the
field. (See ACM, below.)
Think . This is the IBM house organ .
Presumably free to IBM customers
or prospects. IBM. Armonk, NY 10504,
Computer Design . $18/yr. or free. Concen¬
trates on parts for computers, but also
tells technical details of new computers
and peripherals. Computer Design ,
Circulation Dept. . P.O. Box A,
Winchester, Mass. 01890.
There are also expensive (snob?) magazines,
bought by executives.
Computer Age . $95/yr. EDP News Services
Inc., 514 10th St. N.W., Washington
DC 20004.
Date Processing magazine. Oriented to
conventional business applications of
computers. $10. North American
Publishing Co., 134 N. 13th St..
Philadelphia. Pa. 19107.
Computer Digest . $36/yr. Information Group,
1309 Cherry St. , Philadelphia PA 19107.
Data Processing Digest . $51/yr. 6820
la Tijera Blvd. , Los Angeles CA 90045.
Hey now, here's a magazine called Computopia . Only $15 a year. Unfortunately in Japanese.
Computer Age Co. Ltd., Kasumigaseki Bldg., Box 122, Chiyoda-Ku, Tokyo, Japan.
"fr ft mwffcr
A number of inexpensive gadgets purport to
teach you computer principles. Many people have been
disappointed, or worse, made to feel stupid, when they
learn nothing from these. Actually the best these things
really can do is give you an idea of what can be done
with combinations of switches. From that to learning
what computer people really think about is a long, long
way.
\
(JW
G$°°KS l ^'<^5
The best review of what's happening lately, by
none other than Mr. Whole Earth Catalog
himself: Stewart Brand, "Spacewar:
Fanatic Life and Symbolic Death among
the Computer Bums." Rolling Stone . 2
December 72. 50-56. He visited the most
hotshot places and reports especially on
> the fun-and-games side of things.
Gilbert Burck and the Editors of Fortune, The
Computer Age . Harper and Row . Ignore
the ridiculous full title. The Computer Age
and Its Potential for Management ; this book
ha3 nothing to do with management, but is
a nice general orientation to the field.
Thomas H. Crowley, Understanding Computers .
McGraw-Hill. This is the most readable and
straightforward introduction to the techni¬
calities around.
Jeremy Bernstein. The Analytical Engine . Random
House, 1964. History of computers, well told,
and the way things looked in 1964, which
wasn't really very different.
Donald E. Knuth, The Art of Programming . (7 vols.)
A monumental series. excellently written and
widely praised, for anyone who wants to dig
in and be a serious programmer. Three of
the seven volumes are out so far. at about
twenty bucks apiece. Vol. 1: Fundamental
Algorithms . Vol. 2: Seminumerical
Algorithms . Vol. 3: Sorting and Searching .
Addison-Wesley.
BUMMERS
This is perhaps a minority view, but 1 think
any introduction to computers which makes them
seem intrinsically mathematical is misleading.
Historically they began as mathematical, but now
this is simply the wrong way to think about them .
Same goes for emphasizing business uses as if
that were ail.
We will not name here any of the various
disagreeable pamphlets and books which stress
these aspects and don't make things very clear.
R>ABOUT FREE SUBSCRIPTIONS. Many of the
magazines are free to "qualified" readers, usually
those willing to state on a signed form that they
influence the purchase of computers. computer ser¬
vices, punch cards, or the like. (They ask other
questions on the form, but whether you influence
purchase is usually what decides whether they
sci.d you the magazine.) It is also helpful to have
a good-sounding title or company affiliation.
k BINGO CARDS.
These are little postcards you find in all the
I magazines except the ACM and company ones. Fill
in your name and an attractive title ("Systems
Consultant" or "consultant" is good- after all,
someday someone may ask your advice) and circle
the numbers corresponding to the ads that entice
you. You’ll be flooded with interesting, expensively
printed, colorful, educational material on different
people's computers and accessories. And note that
senders don't lose: any company wants its products
known.
However, a postoffice box is good, as it helps
to avoid calls at home from salesmen, wasting their
time as much as yours. If you arc in a rural-type
area where you can assume a company name with no
legal difficulties, so much the better.
POfOCAK
That the field has run boon popularized by its
better writers may simply come from an honest doubt
that ordinary people cun understand computers.
1 dispute that. Through magazines, millions
of Americans have learned about photography. Through
the popular sciencc-and-mochanics type magazines,
and more recently the electronics magazines, various
other technical subjects have become widely understood.
So far nobody has opened up computers. This
is a first attempt. If this book won't do it another one
will.
And you better believe that Popular Computers
magazine Is not very far owny . Soon a fully-loaded
minicomputer will cost loss than the best hi-fi sets.
In a couple of years, thousands of individuals will
own computers, and millions more wiU want to. Look
out. here we go.
4 -
Woops, here it is . Popular Computing . $15 a year
($12 if prepaid), Box 272, Celabosas. CA 91302.
^cule^U^ — )
People ask me often where they can learn
about "science." As in all fields, maga¬
zines are usually the best sources of
general orientation.
Science Diges t is kind of helpful for a start,
although unfortunately they print summaries
of every fool study that generalizes to the
hearts of all humanity from two dozen Iowa
State freshmen.
Scientific American is the favorite. Some stuff
is hard to read but some .isn't; the pic¬
tures and diagrams are terrific.
Science k Technology magazine seems to me
one of the better ones-- breezy, informa¬
tive, not trivial.
Science magazine is read by most actual scien¬
tists, and if you have a lively curiosity
and can guess at the meanings’of words,
will tell you an incredible amount. (This
is a main source for the science articles
in the New York Times , which in turn...)
Their articles on politics of science, and
the future, are very interesting, important,
and depressing. You have to join Am. Assn,
for the Advancement of Science, Washington,
D.C.
Daniel S. Greenberg's Science and Government
Report (sorry-- $35 a year) is what really
tellB it. Greenberg is the man who knows,
both what is shaping up in science and
the insane governmental confusions and
floundering responses and grandstanding
and pork-barrel initiatives. ..
Greenberg is, incidentally, one of
the finest writers of our time and a great
humorist.
Science and Government Repo rt,
Kalorama Station (really?). Box 21123,
Washington, D.C. 20009.
This is the wall that the handwriting
is on.
y\ipecry of tw
The explanations— not yet fully debugged-- are
intended for anybody. The listings of expensive products
and services are intended not only as corroborative detail,
for a general sense of what's available, but also for
business people who might find them helpful, for affluent
individuals and clubs who want to try their hand, and
finally as a box score of how the prices are coming down.
Because we are all going to be able to afford these things
pretty soon.
This diagram shows the amazing and unique way prices
drop in the computer field. The prices shown are for the first
minicomputer, the PDP-5 (and its hugely popular offspring, the
PDP-8); but the principle has held throughout the field, and the
downward trend will probably accelerate due to the new big
integrated circuits.
Another example: an IBM 7090, a very decent million-dollar
computer in I960, was put up for sale at a modish Parke-Bernet
"used computer auction" in 1970. If I remember aright, they
could not get a $1000 bid , because today's machines are so much
smaller, faster and more dependable.
it!s u.s.A.
IvKore^sZ—*
1 u
, O-UKl/
* 6*1^ Wft. \
• }Cem fW .Ur.
• SUhkmH CVivurrrfu
fy*yv>li,*s L*Ur»Vs
• UH r |.«* Cfc s
U. (Ct>
Gwmcj kaj
O (0»k
r <ato XYrrtK
* M
V’ s *=- (»- 4
* Xir»* h»T* SsiV^-s
k - \c<\,r GW«|
t Lfh cWp»n;v*
v;
^osydxJ
• 6£
is* "S£#r-
...
M«t***l d*/(
•s>zcj ,
•Wi6esi./<>•* J bu)
„f s*c)
»f h iTy
•Sofitct, Liter*7ory
•OekMl Tort1«\
• ‘ .tfr CtK itnXt Cktt*
f-w ir
, VI ct, Ctr
Stoifr ^>1
Kt-WTOTtS.
•at
" ft***
a^a tfeh ■
PI»ft*)" ojp
l CO^tlrJkf, oly)
* O-TUa*
• R>C* O-^ •v trJ ,L
•IAMM.S S:i.r
irj
o
ten-
_f HittV 1
W»or« SUt*l 4
(bk- APE*
4 1 he
o-r^.u n
XfvtKn Sew^
iff
V 1 *^
mrs it's hr
II) Tills BOOK
2 INTRO
4 "Where It's At"
6 Sources of Information
5 CYBERCRUD
9 THE MYTH OF THE COMPUTER
10 The Power and the Glory
11 THE DEEP DARK SECRET
(Computer Basics Reduced
to One Easy Page)
12 THE NEW ERA
13 INTERACTIVE SYSTEMS
14 TERMINALS
15 COMPUTER LANGUAGES: Prelude
16 1. BASIC
18 2. TRAC® Language
22 3. APL
26 DATA STRUCTURES
27 Binary Patterns
30 COMPUTER LANGUAGES: Postscript
32 ROCK BOTTOM: Inner Languages
of Computers;
Computer Architecture
34 BUCKY'S WRISTWATCH, a sample
machine-language program
35 The Assembler
36 Your Basic Computer Structure:
THE MINICOMPUTER
38 BIG COMPUTERS
40 GREAT COMPUTERS: Sketches
of Some Specific Machines
43 List of Mini Makers
44 MICROPROCESSORS
(The New Third Kind
of Computer)
45 ADVANCED PROGRAMS
45 OPERATING SYSTEMS
45 TIME-SHARING
46 COMPUTER PEOPLE
47 Program Negotiation
47 Suggestions for Writers
48 Fun and Games
50 How Computer Stuff is
Bought and Sold
51 How Computer Companies are
Financed, Sometimes
52 IBM
57 Digital Equipment Corporation
57 Peripherals for Your Mini
58 SIMULATION
58 OPERATIONS RESEARCH
58 GREAT ISSUES
58 MILITARY USES OF COMPUTERS
59 The ABM System
60 DNA
62 DAMN THAT COMPUTER!
64 STUFF YOU MAY RUN INTO
68 THE CLUB OF ROME
THE BUCK STOPS HERE
Everywhere in the world people can pretend
that your ignorance, or position, or credentials, or
poverty, or general unworthiness, are the reasons
you are being pushed around or made to feel small.
And because you can't tell, you have to take it.
And of course we can do the same thing with
computers. Yes, we can do it in spades. (See
"Cybercrud," p. 8.) But many of us do not want to.
There has to be a better way. There has to be a
better world.
a
■UH«£ IT'S AT
Computers are where it's at.
Recently a bank employee was accused of
embezzling a million and a half dollars by clever
computer programming. His programs shifted
funda from hundreds of people's accounts to his
own. but spparently kept things looking innocent
by clever programming tricks. According to the
papers, the program kept up appearances by
redepoaiting the stolen amount in each account just
as interest payments were about to be calculated,
then withdrawing it again just after. ("Chief
Teller Is Accused of Theft of $1.5 Million at a Bank
Here." New York Times , 23 March 73, p. 1.)
The alleged embezzlement was discovered, not by
bank audit, but by records found on the premises
of a raided bookmaker.
In a recent scandal that has rocked the
insurance world, an insurance company appear?
to have generated thousands of fictitious customers
and accounts by computer, than bilked other
insurance companies— those who re-tnsured the
original fictitious policies*- by fictitious claims
on the fictitious misfortunes of the fictitious
policy-holders.
In April of 1973. according to the Chicago
radio, a burglary ring had a "computerized" list
of a thousand prospective victims.
The obvious consequence is simply for the
computer people to be allowed to take over
altogether. It may Indeed be that computer people
-- the more well-informed and visionary ones,
anyway-- can see the farthest, and appreciate
moat deeply the better ways things can go, and
the steps that have to be taken to get there. (And
Boards of Managers can at least be partially assured
that hanky-panky at the lower levels will be
prevented. if men in charge know where the bodies
are buried. >
That seems to be how it's going. Examples:
The president of Dartmouth College. John
Kemeny, is a respected computer man and a devel¬
oper of one of the important computing languages,
BASIC (see p. ).
The new president of the Russell Sage Foun¬
dation, Hugh Cline, used to teach computing at
Columbia.
It's probably the same in industry. In other
words. more and more. for better and Cor worse,
things are being run by people who know how to
use computers, and this trend is probably irre¬
versible .
In some ways, of course, this is a sinister
portent. In private industry it's not so bad,
since the danger is more of embezzlement and
botch-up than of public menace. But then there’B
the problem of the government. The men who
manage the information tools are more and more
in charge of government, too. And if we can have
a Watergate without computers, just wait. (See
"Burning Issues," p. 5" g)
The way to defend ourselves against computer
people is to become computer people ourselves,
Which of course is the point. We must all become
computer people, at least to the extent that we have
already become Automobile People and Camera
People— that is, informed enough to tell when one
goes by or when someone points one at you.
MANY MANSIONS
The future is going to be full of computers,
for good or ill. Many computer systems are being
prepared by a variety of lunatics, idealists and
dreamers, as well as profit-hungry companies and
unimaginative clods, all for the benefit of mankind.
Which ones will work and which ones we will like is
another matter. The grand and dreamy ones bid fair
to reorganize drastically the lives of mankind.
For instance, Doug Engelbart at Stanford
Research Institute has a beautiful system, called NLS,
that will allow us to use computers as a generalized
poatoffice and publication system. From your com¬
puter terminal you just sign onto Engelbert's System,
and you're at once in touch with lots of writings by
other subscribers, which you may call to your
screen and write replies to.
(These grander and dreamier applications are
discussed on the other side of this book.)
But the plain computer visions are grand
enough.
MINI MANSIONS
But while computers and their combinations
grow bigger and bigger, they also grow smaller
and smaller, a complete computer the size of an
Oreo cookie is now available, guaranteed for
twentyfive years (and very expensive). But its
actual heart, the Intel microprocessor, is only
sixty bucks now , and just wait (see Microprocessors,
P ■ */*/)■ By 1980 there should be as many pro¬
grammed and programmable objects in your house
as you now have TVs, radios and typewriters;
that's a conservative estimate. But JuBt what these
devices will all be doing— ah, there's the question
that has many people talking to themselves.
OTHER COMING THINGS?
There are a lot of tall stories about what
computers will do for the world. Among the most
threatening, I think, are glowing reports of
"scientific" politics (don't you believe it). We
hear how computers will bring "science" to govern¬
ment, helping, for example, to redraw the lines of
election districts. (See Cybercrud. p. .)
Then you may also have heard that computers
are going to be our new mentors and companions,
tutoring us, chatting with us and perhaps lulling us
to sleep— like Hal in 2001 . Worried? Good.
(See "The God-Buildersflip side.) (K ,6*\ 'lA
OfOTZWt Jxwnpjv
A college student broke through the security of the
Pacific Telephone computer system from a terminal and,
according to Computerworld (6 June 73), stole over a
million dollars worth of equipment by ordering it
delivered to him! ( Penthouse , December 73, claims he
was in highschool and it was only nine hundred thousand,
but you get the idea.)
After serving a few weeks in jail, he has formed
his own computer-security consulting company.
More power to him.
The new breed has got to be watched.
This is the urgency of this book. Remember
that the man who writes the payroll program can
write himself some pretty amazing checks-- perhaps
to be mailed out to Switzerland, next year.
From here on it's computer politics, computer
dirty tricks, computer wonderlands, computer
everything.
For anyone concerned to be where it's at,
then, this book will provide a few suggestions.
Now is the time you either know or you don't.
Enough power talk. Knowledge is power.
Here you go. Dig in.
There have been instances where dishonest
university students, nevertheless able programmers,
were able to change their course grades, stored
on a ceikral university computer.
It is not unheard of for ace programmer a to
create grand incomprehensible systems that run
whole companies, systems they can personally play
like a piano, and ihen blackmail their firms.
A friend of a friend of the author is an ace
programmer at the Pentagon, supposedly a private
supervising colonels. On days he is mad at his
boas, he says, the army cannot find out its strength
within 300,000 men. Or three million if he so
chooses.
This awkward Btate of affairs. obviously
spanning both the American continent and moet
realms of endeavor, has come about for various
reasons.
First, the climate of uncomprehension leads
men in management to treat computer matters as
"mere technicalities"— a myth aa sinister as the
public notion that computers are "scientific"--
and abandon the kind of scrutiny they sensibly
apply to any other company activities.
Second . most of today's computer systems are
inherently leaky and insecure-- and likely to stay
that way awhile. Getting things to work on them
involves giving people extraordinary and invisible
powers. (Eventually this will change, but watch
out for the meantime.)
The great world of time-sharing, for instance.
("Time-sharing" means that the computer’s time is
shared by a variety of users simultaneously. See
p. ■/?.) If you have an account on a time-sharing
computer, you can sign on from your terminal
(see p. f>j ) over any telephone, no matter where
you are, and at once do anything that particular
computer allows— calling up programs in a variety
of computer languages, dipping into data on a
variety of subjects as easily as one now consults
a chart.
For instance, at Dartmouth College— where
time-sharing is perhaps farthest advanced as a
way of life-- the user (any Dartmouth student, for
instance) can juBt sit down at a terminal and write
a simple program (in Dartmouth's BASIC language,
for instance) to analyze census data. Since Dart¬
mouth has a complete file on its time-sharing system
of the detailed sample from the 1970 census, the
program can buzz through that and report almost
immediately the numbers of divorced Aleuts or
boy millionaires in the sample, or (more signifi¬
cantly) the relative incomes of different ethnic
groups when categorized according to the ques¬
tioner's interests.
But simple time-sharing ia only the beginning.
Networks of computers are now coming into being.
Most significant of these is the ARPANET (financed
by ARPA, the Defense Department's Advanced
Research Projects Agency. It Is nonetheless non¬
military in character). Dozens of large time-shartng
computers around the country are being tied into the
Arpanet, and a user of any of these can reach dir¬
ectly into the other computers of the network-
using their programs , data or other facilities.
Arpanet enthusiasts see this aa the wave of the
future.
LES&lU:
GCTTlNfr THINGS HEIGHT
The greatest hurdle for the beginner (or
"layman") is making an effort to grasp particulars
of that which he hears about.
A. WHAT IS ITS NAME? Every system or
proposal or project has a name of some sort. Make
an effort to learn it, or you're stuck trying to refer
to "that computerish thing."
(And don't be a snob about acronyms, those
all-cap names and terms sprung from the foreheads
of other words. like ILL1AC and PLATO and CAi.
There’s a need for them. Short words are too
general to use for names. and long phrases are
too unwieldy.)
B. IN WHAT PARTICULAR WAV DOES IT
EMPLOY THE COMPUTER? For record-keeping?
For looking stuff up quickly or fancily? For
searching out combinations? For making up combi¬
nations ana testing their properties’ For enacting
complex phenomena? As automatic typewriters?
To play music, or just to store the written notes?
It is hoped that you will become sensitive
to these distinctions, and be able to understand and
remember them after somebody explains them.
Otherwise you're stuck juat referring to
"that computer buslneaa," and you're in with the
rest of the sheep.
s
This side of the book , Computer Lib proper (whose title is nevertheless
the simplest way to refer to both halves) , is an attempt to explain simply and
concisely why computers are marvelous and wonderful, and what some main
things are in the field ,
The second half of the book, Dream Machines , is specially about fantasy
and imagination, and new techniques for it, That half is related to this half,
but can be read first; I wanted to separate them as distinctly as possible.
The remarks below all refer to this first half, the Computer Lib half
of the book.
FANDOM
With this book I am no longer calling myself a computer
professional. I’m a computer fan, and I’m out to make you
one. (All computer professionals were fans once, but people
get crabbier as they gel older, and more professional.)
A generation of computer fans and hobbyists is well on
its way, but for the most part these are people who have
had some sort of an In, This is meant to be an In for those
who didn't get one earlier.
Tht computer fan is someone who appreciates the
options, fun, excitement, and fiendish fascination of computers.
Not only is the computer fun in itself, like electric trains;
but it also extends to you a wide variety of possible personal
uses. (In case you don't know it, the price of computers
and of using them Is going down as faBt as every other
price is going up. So in the next few decades we may be
reduced to eating soybeans and carrots, but we'll certainly
have computers,)
Somehow the idea is abroad that computer activities
are uncreative, aa compared, say, with rotating clay against
your fingers until it becomes a pot. This is categorically
false. Computers involve imagination and creation at the
highest level. Computers are an involvement you can really
get into, regardless of your trip or your karma. They
are toys, they are tools, they are glorious abstractions.
So it you like mental creation, toy trains, or abstractions,
computers are for you. If you are interested in democracy
and its future, you’d better understand computers. And
it you are concerned about power and the way it is being
used, and aren't we all right now, the same thing goes.
THE SOCIETY
Which brings us to our next topic.
There is no question of whether the computer will
remake society; it has. You deal with computers perhaps
many times a day-- or worse, computers deal with you ,
though you may not know it. Computers are going into
everything, are intertwined with everything, and it's going
to get more and more so. The reader should have a sense
of the dance of options, the remarkably different way6
that computers may be used; by extension, he should come
to see the extraordinary range of options which confront
ua as a society in our future use of them. Indeed, computers
have with a swoop expanded the options of everything.
But a variety of inconvenient systems already touch on
our lives, nuisances we must deal with all the time; and
1 fear that worse is to come. I would like to alert the reader,
in no uncertain terms, that the time has come to be openly
attentive and critical in observing and dealing with computer
systems; and to transform criticism into action. If systems
are bad, annoying and demeaning, these matters should
be brought to the attention of the perpetrators. Politely
at first. But just as the atmospheric pollution fostered by
GM has become a matter for citizen concern and attack through
legitimate channels of protest, so too should the procedural
pollution of inconsiderate computer systems become a matter
for the same kinds of concern. The reader should realize he
can criticize and demand;
THE PUBLIC DOES NOT HAVE TO TAKE
WHAT'S BEING DISHED OUT.
3
There is already a backlash against computers, and
the spirit of this anti-computer backlash is correct, but
should be directed against very specific kinds of things.
The public should stop being mad at "computers" in the
abstract, and start being mad at the people who make in¬
convenient systems. It is not "the computer,” which has
no Intrinsic style or character, which is at fault; it is people
who use "the computer" as an excuse to inconvenience you,
who are at fault. The mechanisms of legitimate public
protest-- sit-ins and soon— should perhaps soon be turned
to complaint over bad and inhuman computer systems.
The question is, will the crummier trends continue?
Or can the public learn, in time, what good and beautiful
things are possible, and translate this realization into an
effective demand? I do not believe this is an obscure or
specialized issue. Its shadow falls across the future of
mankind, if any , like a giant sequoia. Either computer
systems are going to go on inconveniencing our lives, or
they are going to be turned around to make life better.
This is one of the directions that consumerism should turn.
I have an axe to grind: I want to see computers useful
to individuals, and the sooner the better, without necessary
complication or human servility being required. Anyone
who agrees with these principles is on my side, and anyone
who does not, is not.
THIS BOOK IS FOR PERSONAL FREEDOM,
AND AGAINST RESTRICTION AND COERCION.
That's really all it's about. Many people, for reasons of
their own, enjoy and believe in restricting and coercing
people; the reader may decide whether he is for or against
this principle.
A chant you can take to the streets;
COMPUTER POWER TO THE PEOPLE!
DOWN WITH CYBERCRUD!
THE FUTURE. IF ANY
Simply as a matter of citizenship, it is essential to
understand the impact and uses of computers in the world
of the future, if any; and to have a sense of the issues about
computers that confront us as a people-- especially privacy
and data banks, but also strange new additions to our
economic system ("the checkless society"), our political
system (half-baked vote-at-home proposals), and so on.
1 regret that there is not room to cover these here.
Various companies are seeking wide public support for
the sorts of things they are trying to bring about. Legislation
will be proposed on which the views of the public should
have a bearing. It is important that these be understood
sensibly by some part of the electorate before they are made
too permanent, rather than made matters of dumb assent.
Finally, and most solemnly, computers are helping
us understand the unprecedented danger of our future
(see "The Club of Rome," p .&j). The human race may
have only a short time left on earth, even if there is no war.
These studies must be seen and understood by as many
intelligent men of good will as possible.
THEREFORE
Welcome to the computer world, the damndest and
craziest thing that has ever happened. But we. the computer
people. are not crazy. It is you others who are crazy to
let us have all this fun and power to ourselves.
COMPUTERS BELONG TO ALL MANKIND.
B.A., philosophy, Bwarthmore; graduate study U. of Chicago; M.A., sociology. Harvard. Mostly self-taught in computers.
Member of editorial board, Computer Decialona magazine; listed in New York Times' Who’s Who in Computer s; member o
Association for Computing Machinery since 1964.
1967-8.
Research assistant. Communication Reaeurch Institute. 1962-3. Instructor in sociology. Vassar College. 1964-6. ,
Senior staff researcher. Harcourt. Brace a World Publishers. 1966-7. Consultant to Bell Telephone Laboratories, Whippany . ■
Consultant to CBS Laboratories, Stamford. Cl.. 196B-9. Proprietor of The Nelson Organization, Inc., New York ty,
Lecturer in ert, II. of Illinois at Chicago Circle, spring _ ...... of Illinois at Chicago Circle. 1973*4. FMO by Fi.ld.
Lecturer in computer education. Office of Instructional Resources Development,
2
(WUTER |i&
rc)lt7'l Ue 9 ^H
All rights reserved.
Additional copies are $7 postpaid fro«
Hugo's Book. Service, Box 2622 ,
Chicago, Illinois 60690.
Package of ten copies, $50 postpaid.
Any nitwit can understand computers, and many do.
Unfortunately, due to ridiculous historical circumstances,
computers have been made a mystery to most of the world.
And this situation does not seem to be improving. You
hear more and more about computers, but to most people
it's just one big blur. The people who know about computers
often seem unwilling to explain things or answer your ques¬
tions . Stereotyped notions develop about computers operating
in fixed ways-- and so confusion increases. The chasm
between laymen and computer people widens fast and danger¬
ously .
This book is a measure of desperation, so serious
and abysmal is the public sense of confusion and ignorance.
Anything with buttons or lights can be palmed off on the
layman as a computer. There are so many different things,
and their differences are so important; yet to the lay public
they are lumped together as "computer stuff." indistinct
and beyond understanding or criticism. It's as if people
couldn't tell apart camera from exposure meter or tripod,
or car from truck or tollbooth. This book is therefore devoted
to the premise that
EVERYBODY SHOULD UNDERSTAND COMPUTERS.
It is intended to fill a crying need. Lots of everyday people
have asked me where they can learn about computers, and
I have had to say nowhere . Most of what is written about
computers for the layman is either unreadable or silly.
(Some exceptions are listed nearby; you can go to them
instead of this if you want.) But virtually nowhere is the
big picture simply enough explained. Nowhere can one
get a simple, soup-to-nuts overview of what computers
are really about, without technical or mathematical mumbo-
jumbo, complicated examples , or talking down. This book
is an attempt.
(And nowhere have I seen a simple book explaining
to the layman the fabulous wonderland of computer graphics
which awaits us all, a matter which means a great deal
to me personally, as well as a lot to all of us in general.
That's discussed on the flip side.)
Computers are simply a necessary and enjoyable
part of life, like food and books. Computers are not everything,
they are just an aspect of everything, and not to know this
is computer illiteracy, a silly and dangerous ignorance.
Computers are as easy to understand as cameras.
I have tried to make this book like a photography magazine—
breezy, forceful and as vivid as possible. This book will
explain how to tell apples from oranges and which way
is up. If you went to make cider, or help get things right
side up, you will have to go on from here.
I am not a skillful programmer. hands-on person
or eminent professional; 1 am just a computer fan, computer
fanatic if you will. But if Dr. David Reuben can write about
sex I can certainly write about computers. 1 have written
this like a letter to a nephew , chatty and personal. This
is perhaps less boring for the reader, and certainly less
boring for the writer, who is doing this in a hurry. Like
a photography magazine, it throws at you some rudiments
in a merry setting. Other things are thrown in so you'll
get the sound of them, even if the details are elusive.
(We learn most everyday things by beginning with vague
impressions, but somehow encouraging these is not usually
felt to be respectable.) What I have chosen for inclusion
here has been arbitrary, based on what might amuse and
give quick insight. Any bright highschool kid. or anyone
else who can stumble through the details of a photography
magazine, should be able to understand this book. or get
the main ideas. This will not make you a programmer or
a computer person, though it may help you talk that talk.
and perhaps make you feel more comfortable (or at least
able to cope) when new machine# encroach on your life.
If you can get a chance to learn programming- - Bee the
suggestion# on p. -- it’s an awfully good experience for
anybody above fourth grade But the main idea of this
book ia to help you tell apples from oranges . and which
way la up. 1 hope you do go on from here, and have made
a few suggestions.
I am "publishing" this book myself, l n this first
draft form, to test its viability, to see how mad the computer
people get, and to see if there is as much hunger to understand
computers, among all you Folks Out There, ## ] think.
I will be interested to receive corrections and suggestions
for aubaequent editions. If any. (The computer field Is
its own exploding universe . so I'll worry about up-to-dateness
at that time )
M/jK* OF THU
Man has created the myth of "the computer" in his own image,
or one of them; cold, immaculate, sterile, "scientific," oppressive.
Some people flee this image. Others, drawn toward it. have
joined the cold-sterile-oppressive cult, and propagate it like a faith.
Many are still about this mischief, making people do things rigidly
and BBying it is the computer's fault.
Still others see computer> for what they really are: versatile
gizmos which may be turned to any purpose, in any style. And so
a wealth of new styles and human purposes are being proposed and
tried, each proponent propounding his own dream in his own very
personal way.
This book presents a panoply of things and dreams. Perhaps
some will appeal to the reader. ..
THE COMPUTER PRIESTHOOD
Knowledge is power and so it tends to be hoarded.
Experts in any field rarely want people to understand what
they do,and generally enjoy putting people down.
Thus if we say that the use of computers is dominated
by a priesthood, people who spatter you with unintelligable
answers and seem unwilling to give you straight ones,
it is not that they are different in this respect from any
other profession. Doctors, lawyers and construction engineers
are the same way.
But computers are very special, and we have to deal
with them everywhere, and this effectively gives the computer
priesthood a stranglehold on the operation of all large organiza¬
tions. of government bureaux, and anything else that they
run. Members of Congress are now complaining about
control of information by the computer people, that they
cannot get the information even though it's on computers.
Next to this it seems a small matter that in ordinary companies
"untrained" personnel can't get straight questions answered
by computer people; but it's the same phenomenon.
It is imperative for many reasons that the appalling
gap between public and computer insider be closed. As
the saying goes, war is too important to be left to the generals.
Guardianship of the computer can no longer be left to a
priesthood. I see this as just one example of the creeping
evil of Professionalism ,* the control of aspects of society
by cliques of insiders . There may be some chance, though,
that Professionalism can be turned around. Doctors, for
example, are being told that they no longer own people's
bodies . ** And this book may suggest to some computer
professionals that their position should not be as sacrosanct
as they have thought, cither.
This in not to say that computer people are trying
to louse everybody up on purpose. Like anyone trying
to do a complex job as he sees fit, they don’t want to be
bothered with idle questions and complaints. Indeed, probab¬
ly arty group of insiders would have hoarded computers
just as much. If the computer had evolved from the telegraph
(which it just might have), perhaps the librarians would
have hoarded it conceptually as much as the math and en¬
gineering people have. But things have gone too far.
People have legitimate complaints about the way computers
are used. and legitimate ideas for ways they should be
used, which should no longer be shunted aside.
ln no way do I mean to condemn computer people
in general. (Only the ones who don't want you to know
what's going on.) The field is full of fine, imaginative
people. Indeed, the number of creative and brilliant people
known within the field for their clever and creative contri¬
butions is considerable. They deserve to be known as widely
as . say , good photographers or writers .
"Computers are catching hell from growing multitudes
who see them uniformly as the tools of the
regulation and suffocation of all things warm,
moist, and human. The charges, of course,
are not totally unfounded, but in their most
sweeping form they are ineffective and therefore
actually an acquiescence to the dehumanization
which they decry. We clearly need a much more
discerning evaluation in order to clarify the
ethics of various roles of machines in human
affairs."
Ken Knowlton
in "Collaborations with Artists--
a Programmer's Reflections"
in Nake t Rosenfeld, eds. ,
Graphic Languages
(North-Holland Pub. Co.),
p. 399.
• This is a side point. I see Professionalism aa a spreading
disease of the present-day world, a sort of poly-oligarchy
by which various groups (subway conductors, social workers,
bricklayers) can bring things to a halt if their particular
new increased demands are not met. (Meanwhile, the irrele¬
vance of each profession increases, in proportion to Its
increasing rigidity.) Such lucky groups demand more
in each go-round- - but meantime, the number who are
permanently unemployed grows and grows.
*• Ellen Frankfort . Vaginal Politics. Quadrangle Books
Boston Women’s Health Collective, Our Bodies . Ourselves.
Simon a Schuster.
J)ou*ex.